CN108881966B - Information processing method and related equipment - Google Patents

Information processing method and related equipment Download PDF

Info

Publication number
CN108881966B
CN108881966B CN201810333217.2A CN201810333217A CN108881966B CN 108881966 B CN108881966 B CN 108881966B CN 201810333217 A CN201810333217 A CN 201810333217A CN 108881966 B CN108881966 B CN 108881966B
Authority
CN
China
Prior art keywords
client
server
video
calculation result
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810333217.2A
Other languages
Chinese (zh)
Other versions
CN108881966A (en
Inventor
周志刚
陈少杰
张文明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201810333217.2A priority Critical patent/CN108881966B/en
Publication of CN108881966A publication Critical patent/CN108881966A/en
Application granted granted Critical
Publication of CN108881966B publication Critical patent/CN108881966B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/24Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0838Key agreement, i.e. key establishment technique in which a shared key is derived by parties as a function of information contributed by, or associated with, each of these
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/24Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
    • H04N21/2407Monitoring of transmitted content, e.g. distribution time, number of downloads
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • H04N21/63345Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys

Abstract

The embodiment of the invention discloses an information processing method and related equipment, which are used for reducing the loss of a video website by identifying the false playing of a video. The method provided by the embodiment of the invention comprises the following steps: the method comprises the steps that a server respectively adds verification information into each video of a live broadcast platform, wherein the verification information is used for identifying a client of the live broadcast platform; when the client plays the current video, the server receives a client calculation result sent by the client, wherein the client calculation result is obtained by the client according to the verification information of the current video; and when the calculation result of the client is inconsistent with the calculation result of the server, the server determines that the current video watching record is a false record, and the calculation result of the server is calculated by the server according to the video data.

Description

Information processing method and related equipment
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to an information processing method and a related device.
Background
As short videos are increasingly popular and loved by users, some video websites also provide the users with a video uploading and playing function, so that the users can shoot or edit the short videos and upload the short videos to the video websites. In order to encourage more users to upload videos, the video website rewards the users who upload the short videos according to the watching times of the short videos, wherein the more the watching times of the short videos, the more the contents of the short videos are favored by the audiences, the more the video website rewards the users who upload the short videos, however, the mode also provides a good opportunity for a few illegal hackers, namely, the hackers forge the false watching times by stealing the watching times of the videos to obtain profits from the video website, so that the benefits of the video website are infringed.
Therefore, for a video website, how to identify a hacker who steals the video viewing frequency to reduce the loss of the video website is an urgent problem to be solved.
Disclosure of Invention
The embodiment of the invention provides an information processing method and related equipment, which are used for reducing the loss of a video website by identifying the false playing of a video.
A first aspect of an embodiment of the present application provides an information processing method, including: the method comprises the steps that a server respectively adds verification information into each video of a live broadcast platform, wherein the verification information is used for identifying a client of the live broadcast platform; when the client plays the current video, the server receives a client calculation result sent by the client, wherein the client calculation result is obtained by the client according to the verification information of the current video; and when the calculation result of the client is inconsistent with the calculation result of the server, the server determines that the current video watching record is a false record, and the calculation result of the server is calculated by the server according to the video data.
In one possible design, in a first implementation manner of the first aspect of the embodiment of the present application, the method further includes: the server and the client negotiate to generate a shared key, and the shared key is used for encrypting or decrypting communication between the server and the client.
In a possible design, in a second implementation manner of the first aspect of the embodiment of the present application, negotiating, by the server and the client, to generate a shared key includes: the server generates a first public and private key pair according to the information of the current video, wherein the first public and private key pair comprises a first public key and a first private key; the server sends the first public key to the client, so that the client generates a shared secret key according to the first public key; and the server generates the shared secret key according to the first public key and a second public key, and the second public key is generated and sent by the client.
In a possible design, in a third implementation manner of the first aspect of this embodiment of the present application, after the server receives a client computation result sent by the client, before the server determines that a record currently viewing the current video is a ghost record, the method further includes: and the server decrypts the client computing result according to the shared secret key to obtain the decrypted client computing result.
A second aspect of an embodiment of the present application provides an information processing method, including: when a client plays a current video, the client obtains video information of the current video, wherein the video information comprises verification information; the client generates a client calculation result according to the verification information; and the client sends the client calculation result to the server so that the server determines whether the current video watching record is a false record according to the client calculation result.
In one possible design, in a first implementation manner of the second aspect of the embodiment of the present application, the method further includes: the client and the server negotiate to generate a shared secret key, and the shared secret key is used for encrypting or decrypting communication between the client and the video network server; after the client generates a client calculation result according to the verification information and before the client sends the client calculation result to the server, the method further comprises: and the client encrypts the calculation result of the client according to the shared secret key.
A third aspect of an embodiment of the present application provides a server, including: the processing unit is used for respectively adding verification information into each video of the live broadcast platform, wherein the verification information is used for identifying a client of the live broadcast platform; the receiving and sending unit is used for receiving a client computing result sent by the client when the client plays the current video, wherein the client computing result is obtained by computing the client according to the verification information of the current video; and the determining unit is used for determining that the current video watching record is a false record when the client side calculation result is inconsistent with the server calculation result, and the server calculation result is obtained by the server according to the video data.
In a possible design, in a first implementation manner of the third aspect of the embodiment of the present application, the server further includes: a generating unit, configured to negotiate with the client to generate a shared key, where the shared key is used to encrypt or decrypt communications between the server and the client.
In one possible design, in a second implementation manner of the third aspect of the embodiment of the present application, the generating unit includes: the generation module is used for generating a first public and private key pair according to the information of the current video, wherein the first public and private key pair comprises a first public key and a first private key; the receiving and sending module is used for sending the first public key to the client so that the client generates a shared secret key according to the first public key; the generating module is further configured to generate the shared secret key according to the first public key and a second public key, where the second public key is generated and sent by the client.
In a possible design, in a third implementation manner of the third aspect of the embodiment of the present application, the server further includes: and the decryption unit is used for decrypting the client computing result according to the shared secret key to obtain a decrypted client computing result.
A fourth aspect of an embodiment of the present application provides a client, including: the device comprises an obtaining unit and a verification unit, wherein the obtaining unit is used for obtaining video information of a current video when the current video is played by a client, and the video information comprises verification information; the generating unit is used for generating a client computing result according to the verification information; and the receiving and sending unit is used for sending the client calculation result to the server so that the server determines whether the current video watching record is a false record according to the client calculation result.
In a possible design, in a first implementation manner of the fourth aspect of the embodiment of the present application, the generating unit is further configured to: negotiating with the server to generate a shared key, wherein the shared key is used for encrypting or decrypting communication between the client and the video network server; the client further comprises: and the encryption unit is used for encrypting the client computing result according to the shared secret key.
A fifth aspect of the present invention provides an electronic device, including a storage and a processor, wherein the processor is configured to implement the steps of the memory management method according to any one of the above descriptions when the processor executes a computer management program stored in the storage.
A sixth aspect of the present invention provides a computer-readable storage medium having a computer management-like program stored thereon, characterized in that: when executed by a processor, the computer management program implements the steps of the memory management method as described in any one of the above.
According to the technical scheme, the embodiment of the invention has the following advantages: the method comprises the steps that a server respectively adds verification information into each video of a live broadcast platform, wherein the verification information is used for identifying a client of the live broadcast platform; when the client plays the current video, the server receives a client calculation result sent by the client, wherein the client calculation result is obtained by the client according to the verification information of the current video; and when the calculation result of the client is inconsistent with the calculation result of the server, the server determines that the current video watching record is a false record, and the calculation result of the server is calculated by the server according to the video data. In the embodiment of the invention, the server adds the verification information into each video, so that the client obtains the client calculation result according to the verification information, and when the client calculation result is different from the server calculation result generated by the server, the server determines that the record for watching the current video is a false record, namely the current video is not played within the watching times of the current video, the false play of the video is identified, and the loss of a video website is reduced.
Drawings
Fig. 1 is a flowchart of a possible information processing method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a possible server according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a possible client according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a hardware structure of a possible server according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a hardware structure of another possible server according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a hardware structure of a possible client according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a hardware structure of another possible client according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides an information processing method and related equipment, which are used for reducing the loss of a video website by identifying the false playing of a video.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, a flowchart of a possible information processing method provided in an embodiment of the present application specifically includes:
101. the server generates a first public and private key pair;
in order to improve the security of data transmission between the server and the client, the communication between the server and the client may be encrypted. In the embodiment of the invention, an asymmetric RSA encryption algorithm can be adopted to generate the public and private key pair, wherein when a client opens one video for playing each time, a pair of public and private key pairs can be regenerated, and the public and private key pairs of each video are ensured to be different.
Optionally, in the present invention, the server generates a first public and private key pair including a first public key and a first private key according to information of a current video being played by the client. The specific first private key can be generated by using a random number, the first public key calls an interface function of the RSA to generate a corresponding public key, the first private key and the first public key are in a unique pairing relationship, and the implementation mode for generating the first public and private key pair comprises the following steps:
step 1, generating random data;
Randdata=rand();
and generating a random data Randdata by calling a system function rand.
Step 2, generating an Md5 value of the current video as a first private key according to the Identification (ID) number and the random number of the current video;
ClientPrivatekey=Md5.Create(Randdata+VideoId);
where VideoId is used to indicate the ID number of the current video, it should be noted that the ID of the current video can be understood as the room number of each video.
The Md5 value of the random data and the ID number of the current video are calculated by calling the interface Md5.create of the Md5 function to splice together their Md5 values, resulting in the data of the first private key.
And 3, calculating the first public key.
ClientPublickey=RSA.CreatePair(ClientPrivatekey);
The first public key is generated by calling the generation pairing key interface RSA.
The final server thus generates a pair of first public key and first private key information.
102. The client generates a second public and private key pair;
when the server interacts with the client, the server firstly issues the information of the first public key of the server to the client. Meanwhile, the client generates a pair of second public and private keys in the manner of the server. The server generates a second private key according to the ID number of the current video, the user ID number (user ID, Uid) of the user and the random data, so as to ensure that the private keys of different clients playing different videos are different as much as possible. The concrete implementation is as follows:
step 1, generating random data;
Randdata=rand();
and generating a random data Randdata by calling a system function rand.
And 2, generating an Md5 value of the current video as a second private key according to the ID number, the Uid and the random number of the current video.
ServerPrivatekey=Md5.Create(Randdata+Uid+VideoId);
And calculating the Md5 value of the random number, the Uid of the user and the ID number of the current video by calling an interface Md5.Create of the Md5 function to splice together, thereby obtaining the data of the second private key.
And 3, calculating a second public key.
ServerPublickey=RSA.CreatePair(ServerPrivatekey);
The second public key is generated by calling the generation pairing key interface RSA.
So that the client generates information of the second public-private key pair.
At this time, after receiving the first public key issued by the server, the client sends the information of the second public key to the server.
103. The server and the client exchange public keys and generate a shared secret key;
the server and the client exchange respective public key information to generate a shared key, and it is understood that the shared key generated by the server and the client is the same value. It should be noted that, in order to ensure that the shared keys generated by the server and the client are the same value, the server and the client need to negotiate to determine a generation algorithm for generating the shared key according to the first public key and the second public key before generating the shared key.
The specific server and the client exchange public keys and generate a shared secret key as follows:
and step 1, exchanging public keys.
The server sends the first public key ServerPublinkey of the server to the client.
And the client sends the second public key ClientPublinkey of the client to the server.
And step 2, the client generates a shared secret key.
ShareKey=RSA.CreateShareKey(ServerPublickey,ClientPrivatekey);
And 3, the server generates a shared secret key.
ShareKey=RSA.CreateShareKey(ClientPublickey,ServerPrivatekey);
Since the generation factor and the generation algorithm are consistent, the values of ShareKey generated by the server and the client are consistent.
It should be noted that the client generates the shared key through step 2, and the server generates the shared key through step 3, and these two processes are not limited by a time sequence, that is, step 2 may be executed first, step 3 may be executed first, or executed simultaneously, and the specific details are not limited herein.
After the server and the client generate the shared secret key, the server and the client are encrypted or decrypted according to the shared secret key. Optionally, in this embodiment of the application, in addition to performing encryption or decryption processing by using an asymmetric RSA encryption algorithm, a Data Encryption Standard (DES) or another encryption algorithm may also be used, which is not limited herein.
104. The server adds verification information into each video of the live broadcast platform respectively;
for all videos of the live broadcast platform, the user uploads the produced videos to the server, the server verifies each video, and the watermark of the live broadcast platform is added into each video to prevent other platforms from stealing the video. After the video is added with the watermark, the server respectively adds the verification information into each video of the live broadcast platform, and the verification information does not influence the playing of the video and only plays a verification role, namely the verification information is used for identifying the client of the live broadcast platform.
It should be noted that the verification information added by the server in each video may be different, for example, the server may generate the verification information uniquely corresponding to each video according to the identification Information (ID) of each video; alternatively, the server may also generate a unique character string for each video, for example, randomly generate a 128-bit or 256-bit character string for each video, and use the character string as the corresponding verification information for each video. Therefore, the way in which the server generates the verification information is not limited herein.
105. The client obtains video information of a current video;
when a user watches a current video through a client, the client can download video information of the current video, wherein the video information of the current video carries verification information of the current video.
106. The client generates a client calculation result according to the verification information in the video information;
after the client obtains the verification information of the current video, the client calculates to obtain a client calculation result according to the verification information of the current video, and the specific implementation manner can be as follows:
Md5result=md5.create(data+deviceid+token+time);
the method comprises the steps that Md5result is used for representing a calculation result of a client, md5.create is an interface of an Md5 algorithm, data is verification information in a current video, deviceid represents a unique id of equipment of the client, and deviceid of each user is different; the token is issued by the server when the client logs in, and the time represents the current timestamp information of the client.
107. The client sends a client calculation result to the server;
and after the client calculates and obtains a client calculation result, encrypting the client calculation result according to the shared secret key, and sending the encrypted client calculation result to the server. In the embodiment of the present invention, an encryption algorithm, such as an Advanced Encryption Standard (AES) algorithm, may be used to encrypt the calculation result of the client, which is specifically implemented as follows:
encryptData=Aes.Encrypt(Md5result,ShareKey);
the encryptData is used for representing the encrypted client computing result, the Md5result is used for representing the client computing result, and the ShareKey is used for representing the shared secret key.
Optionally, in this embodiment of the present invention, steps 101 to 103 are optional steps, that is, the server and the client may not generate a shared key, and when the client encrypts the client calculation result, in addition to encrypting with the ShareKey, the client may also use a random number that is randomly generated by the server to the client each time the client logs in, so that a specific manner of encrypting the client calculation result by the client is not limited here.
108. The server receives the calculation result of the client according to the shared secret key;
and after receiving the encrypted client calculation result, the server decrypts the encrypted client calculation result to obtain the original client calculation result.
Specifically, the server may also perform a decryption operation on the encrypted client calculation result by using an AES algorithm, which is specifically implemented as follows:
Md5result=Aes.decrypt(encryptData,ShareKey);
therefore, the server receives the encrypted client computing result and decrypts the client computing result according to the shared secret key to obtain the original client computing result.
Correspondingly, when the client encrypts the client calculation result by using the random number randomly generated by the server for the client during each login of the client, the server also performs a decryption operation by using the random number randomly generated, and therefore, a specific manner of performing the decryption operation on the client calculation result by the server is not limited herein.
In addition, only the client of the live broadcast platform decrypts the verification information, and the clients of other non-live broadcast platforms do not know that a piece of verification information exists and how to calculate the calculation result of the client, so that the server can determine that the current video watching record is a false record when the client does not report the calculation result of the client.
109. The server generates a server calculation result according to the video data;
it should be noted that the server has the entire video content of the current video, so the server also performs MD5 calculation according to the calculation method of the client, thereby obtaining the server calculation result, and the specific method for obtaining the server calculation result is similar to that in step 106, and details thereof are not repeated here.
It should be noted that, the server generates the server calculation result through step 109, and the client generates the client calculation result through step 106, and these two processes do not have a specific timing relationship, that is, step 109 may be executed first, step 106 may be executed first, or the two processes may be executed simultaneously, and the specific process is not limited herein.
110. The server determines whether the calculation result of the client side is consistent with the calculation result of the server; if not, go to step 111; if yes, go to step 112;
after obtaining the client calculation result and the server calculation result, the server compares whether the client calculation result is consistent with the server calculation result, and if the client calculation result is inconsistent with the server calculation result, the step 113 is executed; if the client-side computation result is consistent with the server computation result, step 114 is executed.
111. The server determines that the record of the current video to be watched is a false record;
when the calculation result of the client is inconsistent with the calculation result of the server, which indicates that the calculation of the client has a problem, the record of currently watching the video is determined to be a false record, namely the current playing of the current video does not count within the watching times of the current video.
112. The server determines that the record currently watching the current video is a legal record.
When the calculation result of the client is consistent with the calculation result of the server, it can be considered that there is no problem in the calculation of the client, and the client plays the current video really, and then it is determined that the record of currently watching the video is a legal record, that is, the playing of the current video is counted in the watching times of the current video.
It should be noted that, in the embodiment of the present invention, in addition to identifying the spurious playback of the video by using the information processing method shown in fig. 1, the spurious playback of the video may also be identified by using the following method, for example:
mode 1: the server and the client may negotiate a shared key that is used to encrypt or decrypt communications between the server and the client. The server obtains video data such as random data Rdata, starting frame data startFrame, frame number NumFrames needing to be calculated and current timestamp information according to a current video played by the client; the server sends the video data to the client, so that the client performs calculation according to the video data to obtain a client calculation result, specifically, the client performs MD5 calculation on the video data according to the starting frame number of the current video and the frame number required to be calculated, and meanwhile, random data Rdata sent by the server is added during calculation, thereby ensuring that the finally calculated client calculation results are inconsistent even if the starting frame number and the frame number are the same. The concrete implementation is as follows:
md5result ═ Md5.create (video _ data + Rdata); wherein Md5result is used for representing the calculation result of the client, and video _ data is used for representing the video data from the starting frame to the frame number of the video; the Rdata is used for representing random data issued by the server. Therefore, the result data of the HASH, i.e. the calculation result of the client, is finally obtained through the md5 algorithm, and the client encrypts and sends the calculation result of the client to the server by using the shared key. The server receives a client calculation result sent by the client and decrypts the calculation result by using the shared key; and when the client side calculation result is different from the server calculation result, the server determines that the current video watching record is a false record.
Mode 2: the method includes the steps that acquisition information is obtained in a client periodically (the acquisition information comprises a watched video number, a unique uid of a user, opening time of a starting frame when a video is watched, a code rate of a current video, an FPS of a current video playing, hardware decoding of the video, software decoding, recording of a video watching state (whether errors occur or not, whether a pause phenomenon exists or not), watching duration of the video, and the total amount of downloaded video stream data in the whole watching duration), for example, the acquisition information is acquired every 1 minute by taking 1 minute as a boundary, and the acquisition information is reported to a server by using an encryption algorithm negotiated by the client and the server. Therefore, any third party platform that steals the video stream (the third party platform uses a general or third party platform's own video player) or does not watch the video will not have the capture information. Meanwhile, for hackers, the collected information in the text is the encrypted collected information (an encryption algorithm is encrypted by a shared secret key negotiated by a client and a server, and the encryption of the collected information depends on time and unique information of users, so that the collected information is forged by copying the data, the server can identify that the collected information is illegal by decrypting the collected information, and meanwhile, even if the collected information is intercepted, the hackers cannot acquire the shared secret key and cannot decrypt the collected information), so that the collected information is not easy to forge and intercept.
Furthermore, in order to interfere cracking or hackers, the data acquisition information of the plaintext can be reported regularly, the plaintext data acquisition mainly comprises part of information which is not particularly important, the aim is that the data acquisition information is plaintext, and hackers can easily find the data acquisition information, so that the hackers can identify the stealing behavior by reporting the data acquisition information of the plaintext according to the text. The data acquisition information may include unique ID information of the current user equipment, current viewing duration information, ID information of a currently viewed film, and current viewed video bitrate information. This data collection information is mainly used to disturb hackers.
It should be noted that, the video stream traffic data downloaded by the client end reported by the present invention can very well identify the behavior of the embezzlement, and when a video of, for example, 10 minutes is watched normally, the content of the video stream needs to be within a reasonable range of video traffic, and the video stream is illegal if the video stream is not within the range, and even if a hacker embezzles the embezzlement, the hacker needs to have a very large network bandwidth to swipe a large number of false watching times, so that the hacker has a very high cost. Therefore, the user who steals the video watching times can be well identified through the information in the text.
Mode 3: it will be appreciated that for a normal user, the frequency with which he or she simultaneously views video is limited. For hackers, in order to forge a large number of viewing records, they would need to swipe the viewing records a large amount to gain revenue. The client obtains verification data through a certain amount of calculation, wherein the calculation of the verification data consumes CPU resources of the client, so that when the client concurrently watches videos, a large amount of calculation needs to be performed concurrently to consume the CPU resources, the concurrent number is limited, and the behavior of refreshing watching times of the client can be prevented. For normal users, normal watching of one-time video does not affect users, and concurrent watching of a large number of videos has great influence, so that the cost is increased. How to design the algorithm can enable the client to have a certain amount of calculation to obtain the verification result, and the calculation cannot be bypassed, and meanwhile, the server can easily judge whether the result of the client is correct. The invention designs a set of algorithm to make the client have a certain amount of calculation, and the server is easy to identify the result of the client and does not consume the calculation resource of the server. First, the client and the server negotiate a shared key, and then the server generates a random string of 32 bits in length and a number of 0 s. These 2 data are eventually sent to the client. And encrypted with the previously negotiated shared key. After receiving the data of the server, the client decrypts the data of the server to obtain the random data character string and the number digit of 0 of the result data needing to be calculated. The client writes an algorithm to generate the result data needed by the server. The client side calculation includes that the unique device ID of the client side, the TOKEN data used when the client side logs in, the unique video ID watched at the client side currently, the random data issued by the server and the current system timestamp information are spliced together, and the random data of the client side is added to calculate the MD5 value, and the specific implementation mode is as follows:
md5result (devicid + Token + videoId + rdata + Time + clientRandData); wherein DeviceId is the device unique ID of the client; wherein, Token is the Token value when the client logs in the server; the videoId is the unique id of the video; rdata is random data issued by the server; the clientRandData is random data generated by the client. The HASH result data is finally obtained by the md5 algorithm, and the server will request the number of 0 at the beginning in the HASH result data calculated by the client. For example, it is calculated as "2013 dabcd6987abc 4523654123451263". Since the first bit of the result data is 2 instead of 0, the client needs to generate random data to calculate the MD5 value until the start bit is 0, so as to satisfy the requirement of the server. Therefore, the calculation amount of the client is the same as that of continuously generating random data and continuously calculating the MD5 value until the requirement of the server is met. The server may also adjust the computation amount of the client, for example, the greater the number of initial 0 s, the greater the computation amount of the client. Making client computation very complex. And after the client end completes the calculation of the result meeting the server, the result data and the data which the client end participates in the calculation are sent to the server. Then Md5result + DeviceId + Time + clientRandData are included. While other data includes the video unique ID and the token server itself has a record at login. The server verifies the client computing result. The client reports the result data meeting the server to the server, and the server checks according to the client data. Md5result (devicid + Token + videoId + rdata + Time + clientRandData); and judging whether the Md5result is consistent with that of the client or not, judging whether the initial number of 0 is satisfied or not, and if so, indicating that the result of the client is correct. And the server only needs to calculate the MD5 value once to know whether the result of the client is correct, because the client frequently calculates the MD5 value to obtain a proper random data clientrRandData, and the server knows the random data selected by the client from the result reported by the client, so that the server verification is simpler.
The embodiments of the present invention are described above from the perspective of an information processing method, and the embodiments of the present invention are described below from the perspective of a server and a client, respectively.
Referring to fig. 2, fig. 2 is a schematic diagram of an embodiment of a server according to an embodiment of the present invention, where the server specifically includes:
the processing unit 201 is configured to add verification information to each video of a live broadcast platform, where the verification information is used to identify a client of the live broadcast platform;
the receiving and sending unit 202 is configured to receive a client calculation result sent by the client when the client plays the current video, where the client calculation result is calculated by the client according to the verification information of the current video;
and the determining unit 203 is configured to determine that the current video watching record is a false record when the client-side calculation result is inconsistent with the server calculation result, where the server calculation result is calculated by the server according to the video data.
Optionally, in some possible implementations, the server further includes:
a generating unit 204, configured to negotiate with the client to generate a shared key, where the shared key is used to encrypt or decrypt communications between the server and the client.
Optionally, in some possible implementations, the generating unit 204 includes:
a generating module 2041, configured to generate a first public and private key pair according to the information of the current video, where the first public and private key pair includes a first public key and a first private key;
the transceiver module 2042 is configured to send the first public key to the client, so that the client generates a shared secret key according to the first public key;
the generating module 2041 is further configured to generate the shared secret key according to the first public key and a second public key, where the second public key is generated and sent by the client.
Optionally, in a possible implementation manner, the server further includes:
the decryption unit 205 is configured to decrypt the client computing result according to the shared key, so as to obtain a decrypted client computing result.
Referring to fig. 3, fig. 3 is a schematic diagram of an embodiment of a client according to the present invention, where the client specifically includes:
an obtaining unit 301, configured to obtain video information of a current video when a client plays the current video, where the video information includes verification information;
a generating unit 302, configured to generate a client computing result according to the verification information;
a transceiving unit 303, configured to send the client computing result to the server, so that the server determines, according to the client computing result, whether a record of currently watching the current video is a false record.
Optionally, in a possible implementation manner, the generating unit 302 is further configured to: negotiating with the server to generate a shared key, wherein the shared key is used for encrypting or decrypting communication between the client and the video network server;
the client further comprises:
an encrypting unit 304, configured to encrypt the client computing result according to the shared key.
As shown in fig. 4, an embodiment of the present invention provides an electronic device, which includes a memory 410, a processor 420, and a computer program 411 stored in the memory 420 and running on the processor 420, and when the processor 420 executes the computer program 411, the following steps are implemented: respectively adding verification information into each video of a live broadcast platform, wherein the verification information is used for identifying a client of the live broadcast platform; when the client plays the current video, receiving a client calculation result sent by the client, wherein the client calculation result is obtained by the client according to the verification information of the current video; and when the calculation result of the client is inconsistent with the calculation result of the server, determining that the current video watching record is a false record, wherein the calculation result of the server is calculated by the server according to the video data.
Optionally, the processor is further configured to:
negotiating with the client to generate a shared key, the shared key being used to encrypt or decrypt communications between the server and the client.
Optionally, negotiating with the client to generate a shared key includes:
generating a first public and private key pair according to the information of the current video, wherein the first public and private key pair comprises a first public key and a first private key; sending the first public key to the client so that the client generates a shared secret key according to the first public key; and generating the shared secret key according to the first public key and a second public key, wherein the second public key is generated and sent by the client.
Optionally, sending the video data to the client includes: and decrypting the client computing result according to the shared secret key to obtain a decrypted client computing result.
Optionally, before generating the shared key according to the first public key and the second public key, the method further includes: determining, with the client, a generation algorithm for generating the shared key.
In a specific implementation, when the processor 420 executes the computer program 411, any of the embodiments corresponding to fig. 1 may be implemented.
Since the electronic device described in this embodiment is a device used for implementing one of the servers in the embodiment of the present invention, based on the method described in the embodiment of the present invention, those skilled in the art can understand the specific implementation manner of the electronic device in this embodiment and various variations thereof, so that how to implement the method in the embodiment of the present invention by the electronic device is not described in detail herein, and as long as the device used for implementing the method in the embodiment of the present invention by those skilled in the art is within the scope of the present invention to be protected.
Referring to fig. 5, fig. 5 is a schematic diagram illustrating an embodiment of a computer-readable storage medium according to the present invention.
As shown in fig. 5, the present embodiment provides a computer-readable storage medium 500 having a computer program 511 stored thereon, the computer program 511 implementing the following steps when executed by a processor: respectively adding verification information into each video of a live broadcast platform, wherein the verification information is used for identifying a client of the live broadcast platform; when the client plays the current video, receiving a client calculation result sent by the client, wherein the client calculation result is obtained by the client according to the verification information of the current video; and when the calculation result of the client is inconsistent with the calculation result of the server, determining that the current video watching record is a false record, wherein the calculation result of the server is calculated by the server according to the video data.
Optionally, the computer program 511 is further configured to, when executed by the processor, implement the following steps:
negotiating with the client to generate a shared key, the shared key being used to encrypt or decrypt communications between the server and the client.
Optionally, the computer program 511 is further configured to, when executed by the processor, implement the following steps: generating a first public and private key pair according to the information of the current video, wherein the first public and private key pair comprises a first public key and a first private key; sending the first public key to the client so that the client generates a shared secret key according to the first public key; and generating the shared secret key according to the first public key and a second public key, wherein the second public key is generated and sent by the client.
Optionally, the computer program 511 is further configured to, when executed by the processor, implement the following steps: and decrypting the client computing result according to the shared secret key to obtain a decrypted client computing result.
Optionally, the computer program 511 is further configured to, when executed by the processor, implement the following steps: determining, with the client, a generation algorithm for generating the shared key.
Referring to fig. 6, a schematic diagram of another electronic device according to an embodiment of the invention is shown.
As shown in fig. 6, an embodiment of the present invention provides an electronic device, which includes a memory 610, a processor 620, and a computer program 611 stored in the memory 620 and operable on the processor 620, and when the processor 620 executes the computer program 611, the following steps are implemented: when a current video is played, video information of the current video is obtained, wherein the video information comprises verification information; generating a client calculation result according to the verification information; and sending the client calculation result to the server so that the server determines whether the current video watching record is a false record according to the client calculation result.
Optionally, the processor 620 is further configured to perform:
negotiating with the server to generate a shared key, wherein the shared key is used for encrypting or decrypting communication between the client and the video network server;
after the client generates a client calculation result according to the verification information, before the client sends the client calculation result to the server, the processor 620 is further configured to execute:
and encrypting the calculation result of the client according to the shared secret key.
In a specific implementation, when the processor 620 executes the computer program 611, any of the embodiments corresponding to fig. 1 may be implemented.
Since the electronic device described in this embodiment is a device used for implementing one of the clients in the embodiment of the present invention, based on the method described in the embodiment of the present invention, those skilled in the art can understand the specific implementation manner of the electronic device of this embodiment and various variations thereof, so that how to implement the method in the embodiment of the present invention by the electronic device is not described in detail herein, and as long as the device used for implementing the method in the embodiment of the present invention by the person skilled in the art belongs to the intended protection scope of the present invention.
Referring to fig. 7, fig. 7 is a schematic diagram illustrating an embodiment of a computer-readable storage medium according to the present invention.
As shown in fig. 7, the present embodiment provides a computer-readable storage medium 700 having a computer program 711 stored thereon, the computer program 711, when executed by a processor, implementing the steps of: when a current video is played, video information of the current video is obtained, wherein the video information comprises verification information; generating a client calculation result according to the verification information; and sending the client calculation result to the server so that the server determines whether the current video watching record is a false record according to the client calculation result.
Optionally, the computer program 711, when executed by the processor, implements the following steps:
negotiating with the server to generate a shared key, wherein the shared key is used for encrypting or decrypting communication between the client and the video network server;
after generating the client calculation result according to the verification information and before sending the client calculation result to the server, the computer program 711 implements the following steps when executed by the processor:
and encrypting the calculation result of the client according to the shared secret key.
It should be noted that, in the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to relevant descriptions of other embodiments for parts that are not described in detail in a certain embodiment.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. An information processing method characterized by comprising:
the method comprises the steps that a server respectively adds verification information into each video of a live broadcast platform, wherein the verification information is used for identifying a client of the live broadcast platform;
when the client plays the current video, the server receives a client calculation result sent by the client, wherein the client calculation result is calculated by the client according to the verification information of the current video, and specifically, an Md5 value is calculated according to the verification information, the unique id of the device of the client, the token issued by the server when the client logs in, and the current timestamp information of the client;
and when the calculation result of the client is inconsistent with the calculation result of the server, the server determines that the current video watching record is a false record, the calculation result of the server is obtained by the server according to the video data, and the video data is verification information, the unique id of the equipment of the client, the token issued by the server when the client logs in, and the current timestamp information of the client.
2. The method of claim 1, further comprising:
the server and the client negotiate to generate a shared key, and the shared key is used for encrypting or decrypting communication between the server and the client.
3. The method of claim 2, wherein negotiating, by the server and the client, for generating a shared key comprises:
the server generates a first public and private key pair according to the information of the current video, wherein the first public and private key pair comprises a first public key and a first private key;
the server sends the first public key to the client, so that the client generates a shared secret key according to the first public key;
and the server generates the shared secret key according to the first public key and a second public key, and the second public key is generated and sent by the client.
4. The method according to claim 2 or 3, wherein after the server receives the client calculation result sent by the client, the server determines that the record currently watching the current video is a dummy record, and the method further comprises:
and the server decrypts the client computing result according to the shared secret key to obtain the decrypted client computing result.
5. An information processing method characterized by comprising:
when a client plays a current video, the client obtains video information of the current video, wherein the video information comprises verification information;
the client generates a client calculation result according to the verification information, and specifically calculates an Md5 value according to the verification information, the unique device id of the client, a token issued by the server when the client logs in, and the current timestamp information of the client;
and the client sends the client calculation result to the server so that the server determines whether the current video watching record is a false record according to the client calculation result.
6. The method of claim 5, further comprising:
the client and the server negotiate to generate a shared secret key, and the shared secret key is used for encrypting or decrypting communication between the client and the video network server;
after the client generates a client calculation result according to the verification information and before the client sends the client calculation result to the server, the method further comprises:
and the client encrypts the calculation result of the client according to the shared secret key.
7. A server, comprising:
the processing unit is used for respectively adding verification information into each video of the live broadcast platform, wherein the verification information is used for identifying a client of the live broadcast platform;
the receiving and sending unit is used for receiving a client computing result sent by the client when the client plays the current video, wherein the client computing result is obtained by the client through computing according to the verification information of the current video, and specifically is an Md5 value calculated according to the verification information, the unique id of the client device, the token issued by the server when the client logs in, and the current timestamp information of the client;
and the determining unit is used for determining that the current video watching record is a false record when the client computing result is inconsistent with the server computing result, the server computing result is obtained by the server according to the video data, and the video data is verification information, the unique id of the client device, the token issued by the server when the client logs in, and the current timestamp information of the client.
8. A client, comprising:
the device comprises an obtaining unit and a verification unit, wherein the obtaining unit is used for obtaining video information of a current video when the current video is played by a client, and the video information comprises verification information;
the generating unit is used for generating a client computing result according to the verification information, and specifically, an Md5 value is computed according to the verification information, the unique id of the device of the client, the token issued by the server when the client logs in, and the current timestamp information of the client;
and the receiving and sending unit is used for sending the client calculation result to the server so that the server determines whether the current video watching record is a false record according to the client calculation result.
9. A computer-readable storage medium comprising instructions that, when executed on a computer, cause the computer to perform the method of any of claims 1-6.
10. A computer-readable medium storing a computer program executable by a processor to implement the method of any one of claims 1 to 6.
CN201810333217.2A 2018-04-13 2018-04-13 Information processing method and related equipment Active CN108881966B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810333217.2A CN108881966B (en) 2018-04-13 2018-04-13 Information processing method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810333217.2A CN108881966B (en) 2018-04-13 2018-04-13 Information processing method and related equipment

Publications (2)

Publication Number Publication Date
CN108881966A CN108881966A (en) 2018-11-23
CN108881966B true CN108881966B (en) 2021-04-27

Family

ID=64326937

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810333217.2A Active CN108881966B (en) 2018-04-13 2018-04-13 Information processing method and related equipment

Country Status (1)

Country Link
CN (1) CN108881966B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP3959701A1 (en) * 2019-04-24 2022-03-02 Harman International Industries, Incorporated System and cryptographic hardening method for traffic signal verification
CN110401669B (en) * 2019-07-31 2021-06-11 广州方硅信息技术有限公司 Identity verification method and related equipment
CN112929679B (en) * 2021-01-18 2024-03-01 广州虎牙科技有限公司 Method and device for detecting validity of live client and identifying plug-in behavior
CN115695924A (en) * 2021-07-30 2023-02-03 瑞庭网络技术(上海)有限公司 Data processing method, client, server, and computer-readable recording medium
CN114302186A (en) * 2021-12-29 2022-04-08 湖南快乐阳光互动娱乐传媒有限公司 Play record processing method and related device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104080015A (en) * 2014-06-19 2014-10-01 宁波公众信息产业有限公司 Video coding method
CN106385601A (en) * 2016-09-14 2017-02-08 武汉斗鱼网络科技有限公司 Method and system for counting number of persons watching live broadcast simultaneously based on multiprotocol verification
CN106789985A (en) * 2016-12-08 2017-05-31 武汉斗鱼网络科技有限公司 Client validation method and system based on GPU algorithms
CN106878336A (en) * 2017-03-29 2017-06-20 福建中金在线信息科技有限公司 A kind of data interactive method and device
CN107454110A (en) * 2017-09-26 2017-12-08 武汉斗鱼网络科技有限公司 A kind of data verification method and server
CN107484032A (en) * 2017-09-08 2017-12-15 武汉斗鱼网络科技有限公司 Prevent the verification method and device brushed

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094057A (en) * 2006-06-20 2007-12-26 国际商业机器公司 Content dividing method, device and system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104080015A (en) * 2014-06-19 2014-10-01 宁波公众信息产业有限公司 Video coding method
CN106385601A (en) * 2016-09-14 2017-02-08 武汉斗鱼网络科技有限公司 Method and system for counting number of persons watching live broadcast simultaneously based on multiprotocol verification
CN106789985A (en) * 2016-12-08 2017-05-31 武汉斗鱼网络科技有限公司 Client validation method and system based on GPU algorithms
CN106878336A (en) * 2017-03-29 2017-06-20 福建中金在线信息科技有限公司 A kind of data interactive method and device
CN107484032A (en) * 2017-09-08 2017-12-15 武汉斗鱼网络科技有限公司 Prevent the verification method and device brushed
CN107454110A (en) * 2017-09-26 2017-12-08 武汉斗鱼网络科技有限公司 A kind of data verification method and server

Also Published As

Publication number Publication date
CN108881966A (en) 2018-11-23

Similar Documents

Publication Publication Date Title
CN108881966B (en) Information processing method and related equipment
CN107018432B (en) Media content licensing method and device
US20190340384A1 (en) Key providing method, video playing method, server and client
CN111327620B (en) Data security traceability and access control system under cloud computing framework
CN101977190B (en) Digital content encryption transmission method and server side
US7865723B2 (en) Method and apparatus for multicast delivery of program information
CN101350918B (en) Method for protecting copyright of video content
WO2008134463A1 (en) Method and apparatus for assisting with content key changes
CA2603456C (en) Method of implementing a state tracking mechanism in a communications session between a server and a client system
CN108259183B (en) Attention method, attention device, attention electronic equipment and attention medium
CN108768920B (en) Recorded broadcast data processing method and device
US8495154B2 (en) Content usage tracking in superdistribution
CN116938449A (en) Computer-implemented method, storage medium, apparatus and system for preventing fraud
CN110380843B (en) Information processing method and related equipment
CN103237011B (en) Digital content encryption transmission method and server end
US8196214B2 (en) Method and apparatus for securing content using encryption with embedded key in content
CN108769748B (en) Information processing method and related equipment
CN110381342B (en) Information processing method and related equipment
WO2018176531A1 (en) Video request and video playing method and apparatus
CN113014956B (en) Video playing method and device
CN110691267B (en) TLS-based video stream address authentication method, storage medium, equipment and system
KR20090090356A (en) Method for managing the number of visualisations, security processor and terminal for said method
CN108769720B (en) Barrage verification method, computer equipment and storage medium
CN108881934B (en) Barrage verification method, computer equipment and storage medium
CN111711836B (en) Data transmission method, device, terminal equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant