CN109819327B - Illegal broadcasting processing method and device - Google Patents

Illegal broadcasting processing method and device Download PDF

Info

Publication number
CN109819327B
CN109819327B CN201910043552.3A CN201910043552A CN109819327B CN 109819327 B CN109819327 B CN 109819327B CN 201910043552 A CN201910043552 A CN 201910043552A CN 109819327 B CN109819327 B CN 109819327B
Authority
CN
China
Prior art keywords
url
live broadcast
visitors
urls
distribution protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910043552.3A
Other languages
Chinese (zh)
Other versions
CN109819327A (en
Inventor
李俊明
刘珠清
李海挺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wangsu Science and Technology Co Ltd
Original Assignee
Wangsu Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wangsu Science and Technology Co Ltd filed Critical Wangsu Science and Technology Co Ltd
Priority to CN201910043552.3A priority Critical patent/CN109819327B/en
Publication of CN109819327A publication Critical patent/CN109819327A/en
Application granted granted Critical
Publication of CN109819327B publication Critical patent/CN109819327B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention discloses a pirate processing method and a pirate processing device. The method comprises the following steps: the method comprises the steps that monitoring equipment obtains live broadcast load information of a plurality of URLs borne by each edge node in a current period; determining the number of visitors corresponding to the URLs respectively according to the live load information of the URLs; for a first URL, if the monitoring equipment determines that the number of visitors of the first URL is greater than or equal to a first threshold value, forbidding the first URL; the first URL is any one of the plurality of URLs. By adopting the method, the monitoring equipment can identify the illegal broadcast according to the number of visitors of any URL, and the URL is forbidden after the illegal broadcast is identified, so that the phenomenon that the live broadcast video is illegally broadcast can be effectively prevented, and the condition that the interests of a live broadcast platform and a copyright party are violated is effectively avoided.

Description

Illegal broadcasting processing method and device
Technical Field
The invention relates to the technical field of live broadcasting, in particular to a pirate processing method and a pirate processing device.
Background
In recent years, video live broadcasting is rapidly developed, and the live broadcasting of various activities and events promotes the development of live broadcasting services. However, with the development of live broadcast services, the phenomenon of video embezzlement is more rampant, and some hot live broadcasts are recorded and live broadcast or pushed to other live broadcast platforms by a pull stream.
The stealer utilizes the characteristics that some customers do not adopt push-pull stream anti-theft chain or the anti-theft chain mode is simpler and easy to crack, pushes the live game picture to the service domain name of the live platform with smaller scale, and puts the uniform resource locator URL on the stealed webpage to earn click quantity and earn illegal benefits. Such piracy directly infringes the interests of the live broadcast platform and copyright parties, and there is no effective way to prevent such piracy in the prior art.
Therefore, a method for preventing piracy is needed.
Disclosure of Invention
The embodiment of the invention provides a pirate processing method and a device, which are used for preventing a pirate phenomenon.
The embodiment of the invention provides a pirate processing method, which comprises the following steps:
the method comprises the steps that monitoring equipment obtains live broadcast load information of a plurality of URLs borne by each edge node in a current period;
the monitoring equipment determines the number of visitors corresponding to the URLs according to the live load information of the URLs;
for a first URL, if the monitoring equipment determines that the number of visitors of the first URL is greater than or equal to a first threshold value, forbidding the first URL; the first URL is any one of the plurality of URLs.
By adopting the method, the monitoring equipment can identify the illegal broadcast according to the number of visitors of any URL, and the URL is forbidden after the illegal broadcast is identified, so that the phenomenon that the live broadcast video is illegally broadcast can be effectively prevented, and the condition that the interests of a live broadcast platform and a copyright party are violated is effectively avoided; furthermore, the pirate processing method provided by the embodiment of the invention is executed by the monitoring equipment, namely, the pirate processing method can be executed at the server side without the cooperation of the client side, so that the risk of cracking can be effectively avoided, and the universality of the pirate processing method is also improved.
In a possible implementation manner, the live broadcast load information includes a bandwidth value and a code rate of a live broadcast video;
the monitoring equipment determines the number of visitors corresponding to the URLs according to the live load information of the URLs, and the method comprises the following steps:
and the monitoring equipment determines the number of visitors corresponding to the URLs respectively according to the bandwidth values of the URLs and the code rate of the live video.
In a possible implementation manner, before the monitoring device obtains live load information of a plurality of URLs borne by each edge node in a current period, the method further includes:
and the monitoring equipment determines that the live broadcast distribution protocol corresponding to each edge node is a short-connection live broadcast distribution protocol.
In one possible implementation, the live load information includes a connection number;
the monitoring equipment determines the number of visitors corresponding to the URLs according to the live load information of the URLs, and the method comprises the following steps:
and the monitoring equipment respectively determines the connection numbers of the URLs as the number of visitors of the URLs.
In a possible implementation manner, before the monitoring device obtains live load information of a plurality of URLs borne by each edge node in a current period, the method further includes:
and the monitoring equipment determines that the live broadcast distribution protocol corresponding to each edge node is a long-connection live broadcast distribution protocol.
In one possible implementation, the live load information includes a bandwidth value;
if the monitoring equipment determines that the number of visitors of the first URL is greater than or equal to a first threshold value, the monitoring equipment disables the first URL, and the method comprises the following steps:
and if the monitoring equipment determines that the number of visitors of the first URL is greater than or equal to a first threshold value or the bandwidth value of the first URL is greater than or equal to a second threshold value, the first URL is forbidden.
In one possible implementation, the first threshold is determined based on a maximum number of visitors to the first URL in a history period.
The embodiment of the invention provides a pirate processing device, which comprises:
the acquisition unit is used for acquiring live broadcast load information of a plurality of URLs borne by each edge node in the current period;
the processing unit is used for determining the number of visitors corresponding to the URLs according to the live load information of the URLs; and for a first URL, if the number of visitors to the first URL is determined to be greater than or equal to a first threshold value, disabling the first URL; the first URL is any one of the plurality of URLs.
In a possible implementation manner, the live broadcast load information includes a bandwidth value and a code rate of a live broadcast video;
the processing unit is specifically configured to:
and determining the number of visitors corresponding to the URLs respectively according to the bandwidth values of the URLs and the code rate of the live video.
In a possible implementation manner, before the obtaining unit obtains live load information of a plurality of URLs borne by each edge node in a current period, the processing unit is further configured to:
and determining that the live broadcast distribution protocol corresponding to each edge node is a short-connection live broadcast distribution protocol.
In one possible implementation, the live load information includes a connection number;
the processing unit is specifically configured to:
and determining the number of the connections of the URLs as the number of visitors of the URLs.
In a possible implementation manner, before the obtaining unit obtains live load information of a plurality of URLs borne by each edge node in a current period, the processing unit is further configured to:
and determining that the live broadcast distribution protocol corresponding to each edge node is a long-connection live broadcast distribution protocol.
In one possible implementation, the live load information includes a bandwidth value;
the processing unit is specifically configured to:
and if the number of visitors of the first URL is larger than or equal to a first threshold value or the bandwidth value of the first URL is larger than or equal to a second threshold value, disabling the first URL.
In one possible implementation, the first threshold is determined based on a maximum number of visitors to the first URL in a history period.
The embodiment of the present application further provides an apparatus, which has a function of implementing the above-described pirate processing method. This function may be implemented by hardware executing corresponding software, and in one possible design, the apparatus includes: a processor, a transceiver, and a memory; the memory is used for storing computer execution instructions, the transceiver is used for realizing the communication between the device and other communication entities, the processor and the memory are connected through the bus, and when the device runs, the processor executes the computer execution instructions stored by the memory so as to enable the device to execute the pirate processing method.
An embodiment of the present invention further provides a computer storage medium, where a software program is stored, and when the software program is read and executed by one or more processors, the method for processing pirates described in the foregoing various possible implementation manners is implemented.
Embodiments of the present invention also provide a computer program product containing instructions, which when run on a computer, cause the computer to execute the piracy processing method described in the above various possible implementations.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings that are required to be used in the description of the embodiments will be briefly described below.
FIG. 1 is a diagram illustrating a system architecture suitable for use with an embodiment of the present invention;
fig. 2 is a schematic flow chart of a pirate processing method according to an embodiment of the present invention;
fig. 3 is an overall flowchart illustrating a pirate processing method of a short-connection live broadcast distribution protocol according to an embodiment of the present invention;
fig. 4 is an overall flowchart illustrating a pirate processing method of a long-connection live broadcast distribution protocol according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a pirate processing device according to an embodiment of the present invention.
Detailed Description
The present application will be described in detail below with reference to the accompanying drawings, and the specific operation methods in the method embodiments can also be applied to the apparatus embodiments.
With the continuous development of live broadcast video, a pirate phenomenon appears in the prior art. For example, the pirate a pirates the live video of the copyright party B by means of screen recording or pull-stream push, and broadcasts the pirated live video by using the service domain name of the live platform C with a smaller scale. In the process, the pirate A can put the URL of the stolen live video on the pirated webpage, so as to earn illegal benefits such as click rate and the like; the copyright party is infringed because the live video is stolen; the service domain name of the live broadcast platform C with smaller scale is stolen, the cost of the stolen service domain name needs to be paid additionally, and the benefit is also infringed.
Based on this, the embodiments of the present invention provide a pirate processing method and apparatus, which are used to prevent such a pirate phenomenon.
Fig. 1 exemplarily shows a system architecture schematic diagram applicable to an embodiment of the present invention, and as shown in fig. 1, a system 100 applicable to an embodiment of the present invention includes a monitoring device 101, a distribution service center 102, and a plurality of edge nodes, such as an edge node 1031, an edge node 1032, and an edge node 1033 shown in fig. 1. The monitoring device 101 may be connected to the distribution service center 102 through a network, or may be connected to any one of the edge nodes 1031, 1032, and 1033 through a network; the distribution service center 102 may also be connected to any one of the edge nodes 1031, 1032 and 1033 via a network.
Based on the system architecture shown in fig. 1, fig. 2 exemplarily shows a flow diagram corresponding to a pirate processing method provided by an embodiment of the present invention, which includes the following steps:
step 201, the monitoring device obtains live broadcast load information of a plurality of URLs borne by each edge node in the current period.
Step 202, the monitoring device determines the number of visitors corresponding to the plurality of URLs according to the live load information of the plurality of URLs.
Step 203, regarding the first URL, if the monitoring device determines that the number of visitors of the first URL is greater than or equal to a first threshold, the first URL is disabled, and the first URL is any one of the plurality of URLs.
By adopting the method, the monitoring equipment can identify the illegal broadcast according to the number of visitors of any URL, and the URL is forbidden after the illegal broadcast is identified, so that the phenomenon that the live broadcast video is illegally broadcast can be effectively prevented, and the condition that the interests of a live broadcast platform and a copyright party are violated is effectively avoided; furthermore, the pirate processing method provided by the embodiment of the invention is executed by the monitoring equipment, namely, the pirate processing method can be executed at the server side without the cooperation of the client side, so that the risk of cracking can be effectively avoided, and the universality of the pirate processing method is also improved.
Consider that the live distribution protocol includes a long-connection live distribution protocol including RTMP, HTTP-FLV, etc., and a short-connection live distribution protocol including HLS, etc.
Specifically, the live broadcast distribution protocol of the long connection specifically includes: for a live broadcast distribution protocol with RTMP (real time Messaging protocol) equal-length connection, a player and a server establish connection and request live broadcast resources from the server, and then the server continuously responds live broadcast data to the player through the connection, wherein the connection exists all the time, so that the number of people to watch can be counted through the number of the connections.
The short-connection live broadcast distribution protocol specifically comprises the following steps: for a short-connection live broadcast distribution protocol such as HLS, a player continuously requests a server for live broadcast data during live broadcast, after one request is finished, the server does not know whether the subsequent audience can continuously request to watch, so that the number of people watching the live broadcast cannot be judged through the number of connections, and the number of people watching the live broadcast is counted in a bandwidth/code rate mode.
The live broadcast distribution protocols corresponding to the edge nodes are different, and the content of the live broadcast load information acquired by the monitoring equipment is also different.
Based on the above consideration, before step 201 is executed, it should be determined whether the live distribution protocol corresponding to each edge node is the long-connection live distribution protocol or the short-connection live distribution protocol. The following will be described separately according to different live distribution protocols.
Short connection live broadcast distribution protocol
In step 201, if the live broadcast distribution protocol corresponding to each edge node is a short-connection live broadcast distribution protocol, because the connection is established between the client and the edge node in a short time under the short-connection live broadcast distribution protocol, when the edge node responds to the resource, the connection between the client and the edge node disappears, and therefore, the number of visitors to the URL cannot be inferred by the number of connections of the URL.
Based on the above consideration, if the live broadcast distribution protocol corresponding to each edge node is a short-connection live broadcast distribution protocol, the live broadcast load information may include a bandwidth value and a code rate of a live broadcast video.
Further, in step 202, the monitoring device may determine, according to the bandwidth values of the plurality of URLs and the bitrate of the live video, the number of visitors corresponding to the plurality of URLs, respectively. For example, for the first URL, a ratio between a bandwidth value corresponding to the first URL and a bitrate of a live video may be used as the number of visitors corresponding to the first URL. Wherein the first URL is any one of a plurality of URLs.
In step 203, the monitoring device determines whether the first URL needs to be disabled, which may be determined according to the number of visitors of the first URL; alternatively, the number of visitors to the first URL and the bandwidth value of the first URL may be determined in combination.
Illustratively, the monitoring device judges whether the number of visitors of the first URL is larger than or equal to a first threshold value, and if so, the first URL is forbidden; otherwise, the flow ends.
The first threshold may be determined in various ways, and in one example, the first threshold may be determined empirically or actually by one skilled in the art. In another example, the first threshold may be determined based on a maximum number of visitors to the first URL within a historical period, wherein the historical period is a period prior to the current period. For example, if the maximum number of visitors to the first URL in the history period is X, the first threshold may be determined to be M × X, which means that the first threshold is M times the maximum number of visitors to the first URL in the history period.
It should be noted that, considering that the first threshold may be determined according to the maximum visitor count of the first URL in the history period, before executing step 203, the monitoring device may first determine whether there is data (e.g., the maximum visitor count of the first URL) in the history period, and if so, determine whether the visitor count of the first URL is greater than or equal to M times the maximum visitor count of the first URL in the history period; if not, judging whether the visitor number of the first URL is greater than or equal to a first threshold value preset by a person skilled in the art.
For example, the monitoring device may also first determine whether the visitor count of the first URL is greater than or equal to a first threshold, if the visitor count of the first URL is greater than or equal to the first threshold, continue to determine whether the bandwidth value of the first URL is greater than or equal to a second threshold, disable the first URL if the bandwidth value of the first URL is greater than or equal to the second threshold, and end the process if the visitor count of the first URL is less than the first threshold or the bandwidth value of the first URL is less than the second threshold.
The first threshold may be determined as described above.
The second threshold may be determined in various ways, and in one example, the second threshold may be determined empirically or actually by one skilled in the art. In another example, the second threshold may be determined according to a maximum bandwidth value of the first URL within a history period, wherein the history period is a period before the current period. For example, if the maximum bandwidth value of the first URL in the history period is Y, it may be determined that the second threshold is N × Y, that is, the second threshold is N times the maximum bandwidth value of the first URL in the history period.
It should be noted that, considering that the first threshold may be determined according to the maximum number of visitors of the first URL in the history period, and the second threshold may be determined according to the maximum bandwidth value of the first URL in the history period, before performing step 203, the monitoring device may first determine whether data (such as the maximum number of visitors of the first URL, and/or the maximum bandwidth value of the first URL) in the history period exists, and if so, determine whether the number of visitors of the first URL is greater than or equal to M times the maximum number of visitors of the first URL in the history period, and determine whether the bandwidth value of the first URL is greater than or equal to N times the maximum bandwidth value of the first URL in the history period; if the number of visitors of the first URL is not greater than or equal to a first threshold value and a second threshold value preset by a person skilled in the art, judging whether the number of visitors of the first URL is greater than or equal to the first threshold value and the second threshold value.
Further, taking the system architecture shown in fig. 1 as an example, the monitoring device 101 may issue a broadcast forbidding instruction through the distribution service center 102, so as to forbid the first URL. Specifically, the monitoring device 101 may directly feed back the relevant information of the first URL to the distribution service center 102, and the distribution service center 102 may directly perform broadcast prohibiting processing on the first URL, where the time length of the broadcast prohibiting processing may be set according to a contract with a client, or may also be a permanent broadcast prohibiting process, which is not limited specifically.
Optionally, after step 203 is executed, after the first URL is disabled, the monitoring device 101 may further determine whether the first URL is successfully disabled, and if so, the process ends; if the URL is unsuccessful, alarm processing can be carried out, and related information of the first URL is directly alarmed and is processed through manual intervention. The alarm mode may be a mail alarm or a short message alarm, and is not limited specifically.
In order to more clearly describe the foregoing pirate processing method based on the short-connection live broadcast distribution protocol, the following describes a procedure of the pirate processing method of the short-connection live broadcast distribution protocol according to the embodiment of the present invention in an integrated manner with reference to fig. 3. As shown in fig. 3, the following steps may be included:
step 301, each edge node periodically counts the bandwidth value of each URL and the bit rate of the live video.
Step 302, the monitoring device obtains bandwidth values of a plurality of URLs borne by each edge node in the current period and a code rate of a live video.
Step 303, the monitoring device judges whether the bandwidth value in the history period and the code rate of the live video exist, if yes, step 304 is executed; otherwise, step 306 is performed.
Step 304, the monitoring equipment determines the number of visitors of the first URL according to the bandwidth value of the first URL and the code rate of the live video, judges whether the number of visitors of the first URL is more than or equal to M times of the maximum number of visitors of the first URL in the historical period, and if yes, executes step 305; otherwise, the flow ends.
Step 305, the monitoring device determines whether the bandwidth value of the first URL is greater than or equal to N times of the maximum bandwidth value of the first URL in the history period, if so, step 308 is executed; otherwise, the flow ends.
Step 306, the monitoring device determines the number of visitors of the first URL according to the bandwidth value of the first URL and the code rate of the live video, and determines whether the number of visitors of the first URL is greater than or equal to a first threshold preset by a person skilled in the art, if yes, step 307 is executed; otherwise, the flow ends.
Step 307, the monitoring device determines whether the bandwidth value of the first URL is greater than or equal to a second threshold preset by a person skilled in the art, if so, step 308 is executed; otherwise, the flow ends.
Step 308, the monitoring device determines whether broadcast prohibition is needed, if yes, step 309 is executed; otherwise, step 311 is performed.
Step 309, the monitoring device notifies the distribution service center to perform a broadcast barring process on the first URL.
Step 310, the monitoring device judges whether the broadcast prohibition is successful, if so, the flow is ended; otherwise, step 311 is performed.
311, the monitoring device judges whether an alarm is needed, if yes, step 312 is executed; otherwise, the flow ends.
Step 312, the monitoring device alarms, and is handled by human intervention.
It should be noted that the step number is only an exemplary representation of an execution flow, and the sequence of the steps is not specifically limited in the present application, for example, in the step 304 and the step 305, the monitoring device may first determine whether the bandwidth value of the first URL is greater than or equal to N times the maximum bandwidth value of the first URL in the history period, and then determine whether the number of visitors to the first URL is greater than or equal to M times the maximum number of visitors to the first URL in the history period. Similarly, in the above steps 306 and 307, the monitoring device may determine whether the bandwidth value of the first URL is greater than or equal to a second threshold preset by a person skilled in the art, and then determine whether the number of visitors of the first URL is greater than or equal to a first threshold preset by the person skilled in the art.
(II) Long connection live broadcast distribution protocol
Each edge node may filter the abnormal connections before performing step 201. The judgment standard of the abnormal connection may be: the edge judges the ratio relation of the source flow code rate and the output code rate, if the ratio of the continuous N periods is lower than the threshold value, the connection is considered to be abnormal and is not included in the statistics; if the connection is normal, it can be included in the statistics.
In step 201, if the live broadcast distribution protocol corresponding to each edge node is a long-connection live broadcast distribution protocol, because the connection between the client and the edge node is established for a long time under the long-connection live broadcast distribution protocol, even if the client does not acquire live broadcast resources from the edge node any more, the connection between the client and the edge node will not disappear immediately, and therefore, the number of visitors to the URL can be inferred by the number of connections of the URL.
Based on the above consideration, if the live broadcast distribution protocol corresponding to each edge node is a long connection live broadcast distribution protocol, the live broadcast load information may include a connection number and a bandwidth value.
Further, in step 202, the monitoring device may determine the number of connections of the plurality of URLs as the number of visitors to the plurality of URLs, respectively. For example, for the first URL, the number of connections corresponding to the first URL may be set as the number of visitors corresponding to the first URL. Wherein the first URL is any one of a plurality of URLs.
In step 203, the monitoring device determines whether the first URL needs to be disabled, which may be determined according to the number of visitors of the first URL; alternatively, the number of visitors to the first URL and the bandwidth value of the first URL may be determined in combination.
Illustratively, the monitoring device judges whether the number of visitors of the first URL is larger than or equal to a first threshold value, and if so, the first URL is forbidden; otherwise, the flow ends.
The first threshold may be determined in various ways, and in one example, the first threshold may be determined empirically or actually by one skilled in the art. In another example, the first threshold may be determined based on a maximum number of visitors to the first URL within a historical period, wherein the historical period is a period prior to the current period. For example, if the maximum number of visitors to the first URL in the history period is X, the first threshold may be determined to be M × X, which means that the first threshold is M times the maximum number of visitors to the first URL in the history period.
It should be noted that, considering that the first threshold may be determined according to the maximum visitor count of the first URL in the history period, before executing step 203, the monitoring device may first determine whether there is data (e.g., the maximum visitor count of the first URL) in the history period, and if so, determine whether the visitor count of the first URL is greater than or equal to M times the maximum visitor count of the first URL in the history period; if not, judging whether the visitor number of the first URL is greater than or equal to a first threshold value preset by a person skilled in the art.
For example, the monitoring device may also first determine whether the visitor count of the first URL is greater than or equal to a first threshold, if the visitor count of the first URL is greater than or equal to the first threshold, continue to determine whether the bandwidth value of the first URL is greater than or equal to a second threshold, disable the first URL if the bandwidth value of the first URL is greater than or equal to the second threshold, and end the process if the visitor count of the first URL is less than the first threshold or the bandwidth value of the first URL is less than the second threshold.
The first threshold may be determined as described above.
The second threshold may be determined in various ways, and in one example, the second threshold may be determined empirically or actually by one skilled in the art. In another example, the second threshold may be determined according to a maximum bandwidth value of the first URL within a history period, wherein the history period is a period before the current period. For example, if the maximum bandwidth value of the first URL in the history period is Y, it may be determined that the second threshold is N × Y, that is, the second threshold is N times the maximum bandwidth value of the first URL in the history period.
It should be noted that, considering that the first threshold may be determined according to the maximum number of visitors of the first URL in the history period, and the second threshold may be determined according to the maximum bandwidth value of the first URL in the history period, before performing step 203, the monitoring device may first determine whether data (such as the maximum number of visitors of the first URL, and/or the maximum bandwidth value of the first URL) in the history period exists, and if so, determine whether the number of visitors of the first URL is greater than or equal to M times the maximum number of visitors of the first URL in the history period, and determine whether the bandwidth value of the first URL is greater than or equal to N times the maximum bandwidth value of the first URL in the history period; if the number of visitors of the first URL is not greater than or equal to a first threshold value and a second threshold value preset by a person skilled in the art, judging whether the number of visitors of the first URL is greater than or equal to the first threshold value and the second threshold value.
Further, taking the system architecture shown in fig. 1 as an example, the monitoring device 101 may issue a broadcast forbidding instruction through the distribution service center 102, so as to forbid the first URL. Specifically, the monitoring device may directly feed back the relevant information of the first URL to the distribution service center 102, and the distribution service center 102 may directly perform broadcast barring processing on the first URL, where the time length of the broadcast barring processing may be set according to a time length of broadcast barring agreed with a client, or may also be a permanent broadcast barring, which is not limited specifically.
Optionally, after step 203 is executed, after the first URL is disabled, the monitoring device may further determine whether the first URL is disabled successfully, and if so, the process ends; if the URL is unsuccessful, alarm processing can be carried out, and related information of the first URL is directly alarmed and is processed through manual intervention. The alarm mode may be a mail alarm or a short message alarm, and is not limited specifically.
In order to more clearly describe the foregoing pirate processing method based on the long-connection live broadcast distribution protocol, the following describes a flow of the pirate processing method of the long-connection live broadcast distribution protocol according to the embodiment of the present invention in an integrated manner with reference to fig. 4. As shown in fig. 4, the following steps may be included:
step 401, each edge node judges whether an abnormal connection exists, if so, step 402 is executed; otherwise, step 403 is performed.
In step 402, each edge node filters out abnormal connections.
In step 403, each edge node periodically counts the number of connections and bandwidth value of each URL.
In step 404, the monitoring device obtains the connection number and bandwidth value of the plurality of URLs borne by each edge node in the current period.
Step 405, the monitoring device judges whether the connection number and the bandwidth value in the history period exist, if yes, step 406 is executed; otherwise, step 408 is performed.
Step 406, the monitoring device takes the number of the links of the first URL as the number of visitors of the first URL, and determines whether the number of visitors of the first URL is greater than or equal to M times of the maximum number of visitors of the first URL in the history period, if yes, step 407 is executed; otherwise, the flow ends.
Step 407, the monitoring device determines whether the bandwidth value of the first URL is greater than or equal to N times the maximum bandwidth value of the first URL in the history period, if so, step 410 is executed; otherwise, the flow ends.
Step 408, the monitoring equipment takes the number of the connections of the first URL as the number of visitors of the first URL, judges whether the number of the visitors of the first URL is greater than or equal to a first threshold value preset by a person skilled in the art, and if so, executes step 409; otherwise, the flow ends.
Step 409, the monitoring device determines whether the bandwidth value of the first URL is greater than or equal to a second threshold preset by a person skilled in the art, if so, step 410 is executed; otherwise, the flow ends.
Step 410, the monitoring device judges whether broadcasting is required to be prohibited, if yes, step 411 is executed; otherwise, step 413 is performed.
Step 411, the monitoring device notifies the distribution service center to perform a broadcast barring process on the first URL.
Step 412, the monitoring device determines whether the broadcast prohibition is successful, if yes, the process is ended; otherwise, step 413 is performed.
Step 413, the monitoring equipment judges whether an alarm is needed, if so, step 414 is executed; otherwise, the flow ends.
Step 414, the monitoring device alarms, and is handled by human intervention.
It should be noted that the step number is only an exemplary representation of an execution flow, and the sequence of the steps is not specifically limited in the present application, for example, in the step 406 and the step 407, the monitoring device may first determine whether the bandwidth value of the first URL is greater than or equal to N times of the maximum bandwidth value of the first URL in the history period, and then determine whether the number of visitors to the first URL is greater than or equal to M times of the maximum number of visitors to the first URL in the history period. Similarly, in the above steps 408 and 409, the monitoring device may determine whether the bandwidth value of the first URL is greater than or equal to a second threshold preset by a person skilled in the art, and then determine whether the number of visitors of the first URL is greater than or equal to a first threshold preset by the person skilled in the art.
In the embodiment of the invention, the video live broadcast type based on the long-connection live broadcast distribution protocol and the short-connection live broadcast distribution protocol is comprehensively considered, and aiming at the short-connection live broadcast video distribution protocol, the number of visitors of each URL can be determined according to the bandwidth values of a plurality of URLs and the code rate of live broadcast video, and then when the number of visitors of a certain URL is determined to be larger than a first threshold value, the URL is forbidden; for a long-connection live video distribution protocol, the number of visitors of each URL can be determined according to the number of connections of a plurality of URLs, and then when the number of visitors of a certain URL is determined to be larger than a first threshold value, the URL is forbidden. Therefore, the pirate processing method provided by the embodiment of the invention can cover common live broadcast types in the market, has wide applicability, can effectively prevent the occurrence of the phenomenon that live broadcast video is pirated by forbidding the URL, and effectively avoids the condition that the interests of a live broadcast platform and a copyright party are violated.
Based on the same inventive concept, fig. 5 exemplarily shows a schematic structural diagram of a pirate processing apparatus provided by an embodiment of the present invention, as shown in fig. 5, the apparatus includes an obtaining unit 501 and a processing unit 502; the acquiring unit 501 is configured to acquire live load information of multiple URLs borne by each edge node in a current period;
the processing unit 502 is configured to determine, according to the live load information of the plurality of URLs, the number of visitors corresponding to the plurality of URLs respectively; and for a first URL, if the number of visitors to the first URL is determined to be greater than or equal to a first threshold value, disabling the first URL; the first URL is any one of the plurality of URLs.
In a possible implementation manner, the live broadcast load information includes a bandwidth value and a code rate of a live broadcast video;
the processing unit 502 is specifically configured to:
and determining the number of visitors corresponding to the URLs respectively according to the bandwidth values of the URLs and the code rate of the live video.
In a possible implementation manner, before the obtaining unit 501 obtains live load information of a plurality of URLs carried by each edge node in a current period, the processing unit 502 is further configured to:
and determining that the live broadcast distribution protocol corresponding to each edge node is a short-connection live broadcast distribution protocol.
In one possible implementation, the live load information includes a connection number;
the processing unit 502 is specifically configured to:
and determining the number of the connections of the URLs as the number of visitors of the URLs.
In a possible implementation manner, before the obtaining unit 501 obtains live load information of a plurality of URLs carried by each edge node in a current period, the processing unit 502 is further configured to:
and determining that the live broadcast distribution protocol corresponding to each edge node is a long-connection live broadcast distribution protocol.
In one possible implementation, the live load information includes a bandwidth value;
the processing unit 502 is specifically configured to:
and if the number of visitors of the first URL is larger than or equal to a first threshold value or the bandwidth value of the first URL is larger than or equal to a second threshold value, disabling the first URL.
In one possible implementation, the first threshold is determined based on a maximum number of visitors to the first URL in a history period.
The embodiment of the present application further provides an apparatus, which has a function of implementing the above-described pirate processing method. This function may be implemented by hardware executing corresponding software, and in one possible design, the apparatus includes: a processor, a transceiver, and a memory; the memory is used for storing computer execution instructions, the transceiver is used for realizing the communication between the device and other communication entities, the processor and the memory are connected through the bus, and when the device runs, the processor executes the computer execution instructions stored by the memory so as to enable the device to execute the pirate processing method.
An embodiment of the present invention further provides a computer storage medium, where a software program is stored, and when the software program is read and executed by one or more processors, the method for processing pirates described in the foregoing various possible implementation manners is implemented.
Embodiments of the present invention also provide a computer program product containing instructions, which when run on a computer, cause the computer to execute the piracy processing method described in the above various possible implementations.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (8)

1. A pirate processing method, the method comprising:
the method comprises the steps that a monitoring device obtains live broadcast load information of a plurality of Uniform Resource Locators (URLs) borne by each edge node in a current period according to the type of a live broadcast distribution protocol corresponding to each edge node;
when the type of the live broadcast distribution protocol is a short-connection live broadcast distribution protocol, the monitoring equipment determines the number of visitors corresponding to the URLs respectively according to the bandwidth value in the live broadcast load information and the code rate of a live broadcast video, or when the type of the live broadcast distribution protocol is a long-connection live broadcast distribution protocol, the monitoring equipment determines the number of visitors corresponding to the URLs respectively according to the number of connections in the live broadcast load information;
for a first URL, if the monitoring equipment determines that the number of visitors of the first URL is greater than or equal to a first threshold value, forbidding the first URL; the first URL is any one of the plurality of URLs.
2. The method of claim 1, wherein the live load information comprises a bandwidth value;
if the monitoring equipment determines that the number of visitors of the first URL is greater than or equal to a first threshold value, the monitoring equipment disables the first URL, and the method comprises the following steps:
and if the monitoring equipment determines that the number of visitors of the first URL is greater than or equal to a first threshold value or the bandwidth value of the first URL is greater than or equal to a second threshold value, the first URL is forbidden.
3. The method of claim 1 or 2, wherein the first threshold is determined based on a maximum number of visitors to the first URL over a history period.
4. A pirate processing apparatus, characterized in that the apparatus comprises:
the acquisition unit is used for acquiring live broadcast load information of a plurality of Uniform Resource Locators (URLs) borne by each edge node in the current period according to the type of a live broadcast distribution protocol corresponding to each edge node;
the processing unit is used for determining the number of visitors corresponding to the URLs respectively according to the bandwidth value in the live broadcast load information and the code rate of a live broadcast video when the type of the live broadcast distribution protocol is a short-connection live broadcast distribution protocol, or determining the number of visitors corresponding to the URLs respectively according to the number of connections in the live broadcast load information when the type of the live broadcast distribution protocol is a long-connection live broadcast distribution protocol; and for a first URL, if the number of visitors to the first URL is determined to be greater than or equal to a first threshold value, disabling the first URL; the first URL is any one of the plurality of URLs.
5. The apparatus of claim 4, wherein the live load information comprises a bandwidth value;
the processing unit is specifically configured to:
and if the number of visitors of the first URL is larger than or equal to a first threshold value or the bandwidth value of the first URL is larger than or equal to a second threshold value, disabling the first URL.
6. The apparatus of claim 4 or 5, wherein the first threshold is determined based on a maximum number of visitors to the first URL in a history period.
7. A computer-readable storage medium, characterized in that the storage medium stores instructions that, when executed on a computer, cause the computer to carry out performing the method of any one of claims 1-3.
8. A computer device, comprising:
a memory for storing program instructions;
a processor for calling program instructions stored in said memory to execute the method of any one of claims 1 to 3 in accordance with the obtained program.
CN201910043552.3A 2019-01-17 2019-01-17 Illegal broadcasting processing method and device Active CN109819327B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910043552.3A CN109819327B (en) 2019-01-17 2019-01-17 Illegal broadcasting processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910043552.3A CN109819327B (en) 2019-01-17 2019-01-17 Illegal broadcasting processing method and device

Publications (2)

Publication Number Publication Date
CN109819327A CN109819327A (en) 2019-05-28
CN109819327B true CN109819327B (en) 2021-10-29

Family

ID=66603442

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910043552.3A Active CN109819327B (en) 2019-01-17 2019-01-17 Illegal broadcasting processing method and device

Country Status (1)

Country Link
CN (1) CN109819327B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110519609A (en) * 2019-07-23 2019-11-29 广州易方信息科技股份有限公司 A method of illegal bootlegging broadcasting when monitoring live streaming

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003152985A (en) * 2001-11-16 2003-05-23 Skill Up Japan Corp System for batch transforming web contents to image and protecting copyright by using peculiar digital watermark technique
CN108965203A (en) * 2017-05-18 2018-12-07 腾讯科技(深圳)有限公司 A kind of resource access method and server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105656877A (en) * 2015-11-30 2016-06-08 乐视云计算有限公司 Hotlinking detection method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2003152985A (en) * 2001-11-16 2003-05-23 Skill Up Japan Corp System for batch transforming web contents to image and protecting copyright by using peculiar digital watermark technique
CN108965203A (en) * 2017-05-18 2018-12-07 腾讯科技(深圳)有限公司 A kind of resource access method and server

Also Published As

Publication number Publication date
CN109819327A (en) 2019-05-28

Similar Documents

Publication Publication Date Title
US9094521B2 (en) Methods to improve fraud detection on conference calling systems based on observation of participants' call time durations
US10095844B2 (en) System and method for preventing unauthorized use of digital media
CN108769750B (en) Digital content bank system based on block chain technology
KR20160003783A (en) Real-time anti-piracy for broadcast streams
KR101277601B1 (en) Protection and monitoring of content diffusion in a telecommunications network
US10904251B2 (en) Blockchain-based copyright protection method and apparatus, and electronic device
US20230367914A1 (en) Systems, devices, and methods for prevention of recording content
CN109819327B (en) Illegal broadcasting processing method and device
CN106815734B (en) Information transmission method and device
CN109218753B (en) Method and equipment for displaying special effect of virtual gift
CN111949421B (en) SDK calling method, device, electronic equipment and computer readable storage medium
CN111988644B (en) Anti-stealing-link method, device, equipment and storage medium for network video
CN112257035A (en) Digital work copyright protection method and device based on playing platform
CN112257036A (en) Digital work copyright protection method and device based on playing end
CN107819754A (en) A kind of anti-abduction method, monitoring server, terminal and system
CN111417122A (en) Attack prevention method and device
CN111400674A (en) Security software self-protection method and device based on Hook technology
JP2011109489A (en) Alert management apparatus and alert management method
US9524381B2 (en) Piracy prevention in digital rights management systems
CN112543353A (en) Video playing request processing method and related device
CN109995703B (en) Data source security inspection method and edge server
CN112642162A (en) User login management method and device, computer equipment and storage medium
CN111263198A (en) Pirate tracking method of video resources
CN113742697B (en) Equipment ownership change method, device, equipment and medium
CN109240475A (en) Factory reset method, apparatus, system, computer installation and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant