CN110380843B - Information processing method and related equipment - Google Patents

Information processing method and related equipment Download PDF

Info

Publication number
CN110380843B
CN110380843B CN201810332146.4A CN201810332146A CN110380843B CN 110380843 B CN110380843 B CN 110380843B CN 201810332146 A CN201810332146 A CN 201810332146A CN 110380843 B CN110380843 B CN 110380843B
Authority
CN
China
Prior art keywords
client
video
server
frame number
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810332146.4A
Other languages
Chinese (zh)
Other versions
CN110380843A (en
Inventor
周志刚
陈少杰
张文明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tibet Zhaoxun Technology Engineering Co ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201810332146.4A priority Critical patent/CN110380843B/en
Publication of CN110380843A publication Critical patent/CN110380843A/en
Application granted granted Critical
Publication of CN110380843B publication Critical patent/CN110380843B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/23418Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams or manipulating encoded video stream scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/44008Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving operations for analysing video streams, e.g. detecting features or characteristics in the video stream
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/44Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs
    • H04N21/4405Processing of video elementary streams, e.g. splicing a video clip retrieved from local storage with an incoming video stream or rendering scenes according to encoded video stream scene graphs involving video stream decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Multimedia (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The embodiment of the invention discloses an information processing method and related equipment, which are used for reducing the loss of a video website by identifying the false playing of a video. The method provided by the embodiment of the invention comprises the following steps: the server obtains video data according to a current video played by the client; the server sends the video data to the client so that the client obtains a client calculation result according to the video data; the server receives the client computing result sent by the client; and when the client calculation result is different from the server calculation result, the server determines that the current video watching record is a false record, and the server calculation result is obtained by the server according to the video data calculation.

Description

Information processing method and related equipment
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to an information processing method and a related device.
Background
As short videos are more and more popular and loved by users, some video websites also provide the users with a video uploading and playing function, so that the users can shoot or edit the short videos and upload the short videos to the video websites. In order to encourage more users to upload videos, the video website rewards the users who upload the short videos according to the watching times of the short videos, wherein the more the watching times of the short videos, the more the contents of the short videos are favored by the audiences, the more the video website rewards the users who upload the short videos, however, the mode also provides a good opportunity for a few illegal hackers, namely, the hackers forge the false watching times by stealing the watching times of the videos to obtain profits from the video website, so that the benefits of the video website are infringed.
Therefore, it is an urgent problem to solve how to identify hackers who steal the video watching frequency to reduce the loss of the video website.
Disclosure of Invention
The embodiment of the invention provides an information processing method and related equipment, which are used for reducing the loss of a video website by identifying the false playing of a video.
A first aspect of an embodiment of the present invention provides an information processing method, including: the server obtains video data according to a current video played by the client; the server sends the video data to the client so that the client obtains a client calculation result according to the video data; the server receives the client computing result sent by the client; and when the client calculation result is different from the server calculation result, the server determines that the current video watching record is a false record, and the server calculation result is obtained by the server according to the video data calculation.
In a possible embodiment, the method further comprises: the server and the client negotiate to generate a shared key, and the shared key is used for encrypting or decrypting communication between the server and the client.
In one possible embodiment, the server and the client negotiating to generate the shared key includes: the server generates a first public and private key pair according to the information of the current video, wherein the first public and private key pair comprises a first public key and a first private key; the server sends the first public key to the client, so that the client generates a shared secret key according to the first public key; and the server generates the shared secret key according to the first public key and a second public key, and the second public key is generated and sent by the client.
In one possible embodiment, the server sending the video data to the client comprises: the server encrypts the video data according to the shared secret key to obtain encrypted video data; and the server sends the encrypted video data to the client.
A second aspect of an embodiment of the present invention provides an information processing method, including: a client receives video data sent by a server, wherein the video data is obtained by the server according to a current video played by the client; the client generates a client calculation result according to the video data; and the client sends the client calculation result to the server so that the server determines whether the current video watching record is a false record according to the client calculation result.
In one possible embodiment, the method further comprises: the client and the server negotiate to generate a shared secret key, and the shared secret key is used for encrypting or decrypting communication between the client and the video network server; after the client receives the video data sent by the server, and before the client generates a client calculation result according to the video data, the method further comprises: and the client decrypts the video data according to the shared secret key.
A third aspect of an embodiment of the present invention provides a server, including: the obtaining unit is used for obtaining video data according to a current video played by the client; the receiving and sending unit is used for sending the video data to the client so that the client can obtain a client calculation result according to the video data; the receiving and sending unit is further used for receiving the client computing result sent by the client; and the determining unit is used for determining that the current video watching record is a false record when the client side calculation result is different from the server calculation result, and the server calculation result is obtained by the server according to the video data calculation.
In one possible embodiment, the server further comprises: a generating unit, configured to negotiate with the client to generate a shared key, where the shared key is used to encrypt or decrypt communications between the server and the client.
In a possible embodiment, the generating unit comprises: the generation module is used for generating a first public and private key pair according to the information of the current video, wherein the first public and private key pair comprises a first public key and a first private key; the receiving and sending module is used for sending the first public key to the client so that the client generates a shared secret key according to the first public key; the generating module is further configured to generate the shared secret key according to the first public key and a second public key, where the second public key is generated and sent by the client.
In a possible embodiment, the transceiver unit is specifically configured to: encrypting the video data according to the shared secret key to obtain encrypted video data; and sending the encrypted video data to the client.
A fourth aspect of an embodiment of the present invention provides a client, including: the receiving and sending unit is used for receiving video data sent by a server, wherein the video data are obtained by the server according to a current video played by the client; the generating unit is used for generating a client computing result according to the video data; the receiving and sending unit is further configured to send the client calculation result to the server, so that the server determines whether the current video watching record is a fake record according to the client calculation result.
In a possible embodiment, the generating unit is further configured to: negotiating with the server to generate a shared key, wherein the shared key is used for encrypting or decrypting communication between the client and the video network server; the server further comprises: and the decryption unit is used for decrypting the video data according to the shared secret key.
A fifth aspect of the present invention provides an electronic device, including a storage and a processor, wherein the processor is configured to implement the steps of the memory management method according to any one of the above descriptions when the processor executes a computer management program stored in the storage.
A sixth aspect of the present invention provides a computer-readable storage medium having a computer management-like program stored thereon, characterized in that: when executed by a processor, the computer management program implements the steps of the memory management method according to any one of the above.
According to the technical scheme, the embodiment of the invention has the following advantages: the server obtains video data according to a current video played by the client; the server sends the video data to the client so that the client obtains a client calculation result according to the video data; the server receives the client computing result sent by the client; and when the client calculation result is different from the server calculation result, the server determines that the current video watching record is a false record, and the server calculation result is obtained by the server according to the video data calculation. In the embodiment of the invention, the server obtains video data according to the current video being played and sends the video data to the client, so that the client obtains a client calculation result according to the video data, and when the client calculation result is different from a server calculation result generated by the server, the server determines that the record for watching the current video is a false record, namely the current video is not played within the watching times of the current video, the false play of the video is identified, and the loss of a video website is reduced.
Drawings
Fig. 1 is a flowchart of a possible information processing method according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a possible server according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a possible client according to an embodiment of the present invention;
fig. 4 is a schematic diagram of a hardware structure of a possible server according to an embodiment of the present invention;
fig. 5 is a schematic diagram of a hardware structure of another possible server according to an embodiment of the present invention;
fig. 6 is a schematic diagram of a hardware structure of a possible client according to an embodiment of the present invention;
fig. 7 is a schematic diagram of a hardware structure of another possible client according to an embodiment of the present invention.
Detailed Description
The embodiment of the invention provides an information processing method and related equipment, which are used for reducing the loss of a video website by identifying the false playing of a video.
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, a flowchart of a possible information processing method according to an embodiment of the present invention specifically includes:
101. the server generates a first public and private key pair;
in order to improve the security of data transmission between the server and the client, the communication between the server and the client may be encrypted. In the embodiment of the invention, an asymmetric RSA encryption algorithm can be adopted to generate the public and private key pair, wherein when a client opens one video for playing each time, a pair of public and private key pairs can be regenerated, and the public and private key pairs of each video are ensured to be different.
Optionally, in the present invention, the server generates a first public and private key pair including a first public key and a first private key according to information of a current video being played by the client. The specific first private key can be generated by using a random number, the first public key calls an interface function of the RSA to generate a corresponding public key, the first private key and the first public key are in a unique pairing relationship, and the implementation mode for generating the first public and private key pair comprises the following steps:
step 1, generating random data;
Randdata=rand();
and generating a random data Randdata by calling a system function rand.
Step 2, generating an Md5 value of the current video as a first private key according to the Identification (ID) number and the random number of the current video;
ClientPrivatekey=Md5.Create(Randdata+VideoId);
where VideoId is used to indicate the ID number of the current video, it should be noted that the ID of the current video can be understood as the room number of each video.
And calculating the Md5 value of the random data and the ID number of the current video by splicing the random data and the ID number of the current video by calling an interface Md5.Create of an Md5 function, thereby obtaining data of a first private key.
And 3, calculating the first public key.
ClientPublickey=RSA.CreatePair(ClientPrivatekey);
The first public key is generated by calling the generation pairing key interface RSA.
The final server thus generates a pair of first public key and first private key information.
102. The client generates a second public and private key pair;
when the server interacts with the client, the server firstly issues the information of the first public key of the server to the client. Meanwhile, the client generates a pair of second public and private keys according to the mode of the server. The server generates a second private key according to the ID number of the current video, the user ID number (user ID, uid) of the user and the random data, so as to ensure that the private keys of different clients playing different videos are different as much as possible. The concrete implementation is as follows:
step 1, generating random data;
Randdata=rand();
and generating a random data Randdata by calling a system function rand.
And 2, generating an Md5 value of the current video according to the ID number, the Uid and the random number of the current video as a second private key.
ServerPrivatekey=Md5.Create(Randdata+Uid+VideoId);
And calculating the Md5 value of the random number, the Uid of the user and the ID number of the current video by splicing the random number, the Uid of the user and the ID number of the current video by calling an interface Md5.Create of the Md5 function, thereby obtaining the data of the second private key.
And 3, calculating a second public key.
ServerPublickey=RSA.CreatePair(ServerPrivatekey);
The second public key is generated by calling the generation pairing key interface RSA.
So that the client generates information of the second public-private key pair.
At the moment, after receiving the first public key issued by the server, the client sends the information of the second public key of the client to the server.
103. The server and the client exchange public keys and generate a shared secret key;
the server and the client exchange respective public key information to generate a shared key, and it is understood that the shared key generated by the server and the client is the same value. It should be noted that, in order to ensure that the shared key generated by the server and the client is the same value, the server and the client need to negotiate to determine a generation algorithm before generating the shared key, where the generation algorithm is used to generate the shared key according to the first public key and the second public key.
The specific server and the client exchange public keys and generate a shared secret key as follows:
and step 1, exchanging public keys.
The server sends a first public key ServerPublickey of the server to the client.
And the client sends the second public key ClientPublinkey of the client to the server.
And step 2, the client generates a shared secret key.
ShareKey=RSA.CreateShareKey(ServerPublickey,ClientPrivatekey);
And 3, the server generates a shared secret key.
ShareKey=RSA.CreateShareKey(ClientPublickey,ServerPrivatekey);
Since the generation factor and the generation algorithm are consistent, the values of ShareKey generated by the server and the client are consistent.
It should be noted that the client generates the shared key through step 2, and the server generates the shared key through step 3, and these two processes are not limited by a time sequence, that is, step 2 may be executed first, step 3 may be executed first, or executed simultaneously, and the specific details are not limited herein.
After the server and the client generate the shared secret key, the server and the client are encrypted or decrypted according to the shared secret key. Optionally, in the embodiment of the present invention, in addition to performing encryption or decryption processing by using an asymmetric RSA encryption algorithm, a Data Encryption Standard (DES) or another encryption algorithm may also be used, which is not limited herein.
104. The server obtains video data according to a current video played by the client;
in order to detect whether the user really watches the current video through the client, the server checks the client playing the current video at intervals in a data spot check mode. It should be noted that, when the client plays the video, the client and the server are always in communication, so that the server knows the duration information of the current video played by the client, and the server can randomly generate and send the video data of the client according to the time information of the current video played by the client.
Specifically, the server may obtain the video frame number (which refers to a key frame of the video, that is, picture data of one frame of the video) of the current video and the current frame number information from the current video, and further obtain the video data, which is specifically implemented as follows:
step 1, the server generates a section of random data.
Rdata=rand();
And 2, the server randomly selects a video starting frame number from the playing time of the client.
Each video is composed of video frames, and the server acquires the video frame number at the current moment according to the moment played by the current client, namely the video frame number startFrame from the beginning of the video to the moment played.
And 3, the number of the video frames needing to be read.
Video data NumFrames which indicates how many frames are taken from the current video frame number startFrame.
And (3) packaging the information obtained in the steps (1) to (3) together by the server to obtain video data, wherein the video data comprises random data Rdata, starting frame data startFrame, frame number NumFrames required to be calculated and current timestamp information.
105. The server encrypts the video data according to the shared secret key to obtain encrypted video data;
and after the server obtains the video data, encrypting the video data according to the shared secret key to obtain the encrypted video data. The embodiment of the invention adopts an encryption algorithm AES for encryption, and the encryption algorithm AES is specifically realized as follows:
encryptData=Aes.encrypt(Rdata+startFrame+NumFrames+timestamp,ShareKey);
encrypt data is used for representing encrypted video data, aes, encrypt is an encrypted interface, timestamp represents current timestamp information, and ShareKey represents a shared secret key.
106. The server sends the encrypted video data to the client;
and after obtaining the encrypted video data, the server sends the encrypted video data to the client.
107. The client decrypts the encrypted video data according to the shared secret key to obtain video data;
since the player of the video website is developed by the video website, if the player is a normal client, the player must be watched by the video player of the video website, and thus the normal client has the functions of receiving the video data of the server and decrypting the video data. Therefore, after the client receives the encrypted video data, the original video data can be decrypted. The client may also use an AES algorithm to decrypt the encrypted video data, which is specifically implemented as follows:
Rdata+startFrame+NumFrames+timestamp=Aes.decrypt(encryptData,ShareKey);
therefore, the client decrypts the video data sent by the server, which includes random data Rdata, the starting frame number startFrame of the video, the frame number NumFrames of the video, and the current timestamp information timestamp.
108. The client generates a client calculation result according to the video data;
and after receiving the encrypted video data sent by the server, the client decrypts the encrypted video data to obtain original video data, calculates the data of the video frames according to the video data, generates a client calculation result and reports the client calculation result to the server. It should be noted that, when the client wants to watch the current video, the client downloads the current video from the server and plays the current video, and then the video data sent by the server is obtained by performing HASH calculation on the starting frame of the current video downloaded by the client and the number of frames to be calculated, that is, a client calculation result, and reports the client calculation result to the server. Therefore, only the client which really plays the current video can correctly calculate to obtain normal result data. The client performs MD5 calculation on the video data according to the starting frame number of the current video and the frame number required to be calculated, and random data Rdata sent by the server is added during calculation, so that the fact that the calculation results of the client obtained through final calculation are inconsistent even if the starting frame number and the frame number are the same is guaranteed. The concrete implementation is as follows:
Md5result=Md5.Create(video_data+Rdata);
wherein Md5result is used for representing the calculation result of the client, and video _ data is used for representing the video data from the starting frame to the frame number of the video; the Rdata is used for representing random data issued by the server. Therefore, the result data of the HASH, i.e. the client calculation result, is finally obtained through the md5 algorithm.
109. The client sends a client calculation result to the server according to the shared secret key;
and after the client calculates and obtains a client calculation result, encrypting the client calculation result according to the shared secret key, and sending the encrypted client calculation result to the server. In the embodiment of the present invention, an encryption algorithm, such as an Advanced Encryption Standard (AES) algorithm, may be used to encrypt the calculation result of the client, and the encryption is specifically implemented as follows:
encryptData=Aes.Encrypt(Md5result,ShareKey);
the encrypted data is used for representing the encrypted client computing result, the Md5result is used for representing the client computing result, and the ShareKey is used for representing the shared secret key.
Therefore, the client sends the encrypted client calculation result, namely encryptData, to the server.
110. The server receives the calculation result of the client according to the shared secret key;
and after receiving the encrypted client calculation result, the server decrypts the encrypted client calculation result to obtain the original client calculation result.
Specifically, the server may also perform a decryption operation on the encrypted client calculation result by using an AES algorithm, which is specifically implemented as follows:
Md5result=Aes.decrypt(encryptData,ShareKey);
therefore, the server receives the encrypted client-side calculation result and obtains the original client-side calculation result by decrypting according to the shared secret key.
111. The server generates a server calculation result according to the video data;
it should be noted that the server has the entire video content of the current video, so the server also extracts the video data of the start frame and the frame number of the video according to the calculation method of the client to perform MD5 calculation, thereby obtaining the calculation result of the server, and the specific method for obtaining the calculation result of the server is similar to that in step 108, and details are not repeated here.
It should be noted that, the server generates the server computation result through step 111, and the client generates the client computation result through step 108, and these two processes do not have a specific timing relationship, that is, step 111 may be executed first, step 108 may be executed first, or the two processes may be executed simultaneously, and the specific process is not limited herein.
112. The server determines whether the client calculation result is consistent with the server calculation result; if not, go to step 113; if yes, go to step 114;
after obtaining the client calculation result and the server calculation result, the server compares whether the client calculation result is consistent with the server calculation result, and if the client calculation result is inconsistent with the server calculation result, the step 113 is executed; if the client-side computation result is consistent with the server computation result, step 114 is executed.
113. The server determines that the record of the current video to be watched is a false record;
when the calculation result of the client is inconsistent with the calculation result of the server, which indicates that the calculation of the client has a problem, determining that the record of the currently watched video is a false record, namely that the current playing of the current video does not count as the watching times of the current video
114. The server determines that the record currently watching the current video is a legal record.
When the calculation result of the client is consistent with the calculation result of the server, it can be considered that there is no problem in the calculation of the client, and the client plays the current video really, and then it is determined that the record of currently watching the video is a legal record, that is, the playing of the current video is counted in the watching times of the current video.
It should be noted that, in the embodiment of the present invention, in addition to identifying the spurious playback of the video by using the information processing method shown in fig. 1, the spurious playback of the video may also be identified by using the following method, for example:
mode 1: the method includes the steps that acquisition information is obtained in a client periodically (the acquisition information comprises a watched video number, a unique uid of a user, opening time of a starting frame when a video is watched, a code rate of a current video, an FPS of a current video playing, hardware decoding of the video, software decoding, recording of a video watching state (whether errors occur or not, whether a pause phenomenon exists or not), watching duration of the video, and the total amount of downloaded video stream data in the whole watching duration), for example, the acquisition information is acquired every 1 minute by taking 1 minute as a boundary, and the acquisition information is reported to a server by using an encryption algorithm negotiated by the client and the server. Therefore, any third party platform that steals the video stream (the third party platform uses a general or third party platform's own video player) or does not watch the video will not have the capture information. Meanwhile, for hackers, the collected information is encrypted collected information (an encryption algorithm is encrypted by a shared key negotiated between a client and a server, and the encryption of the collected information depends on time and unique information of users, so that the collected information is forged by copying the data, the server can identify that the collected information is illegal by decrypting the collected information, and even if the collected information is intercepted, the hackers cannot obtain the shared key and cannot decrypt the collected information), so that the collected information is not easy to forge and intercept.
Furthermore, in order to interfere cracking or hackers, the data acquisition information of the plaintext can be reported regularly, the plaintext data acquisition mainly comprises part of information which is not particularly important, the aim is that the data acquisition information is plaintext, and hackers can easily find the data acquisition information, so that the hackers can identify the stealing behavior by reporting the data acquisition information of the plaintext according to the text. The data acquisition information may include unique ID information of the current user equipment, current viewing duration information, ID information of a currently viewed film, and current viewed video bitrate information. This data collection information is mainly used to disturb hackers.
It should be noted that, the video stream traffic data downloaded by the client end reported by the present invention can very well identify the behavior of the embezzlement, and when a video of, for example, 10 minutes is watched normally, the content of the video stream needs to be within a reasonable range of video traffic, and the video stream is illegal if the video stream is not within the range, and even if a hacker embezzles the embezzlement, the hacker needs to have a very large network bandwidth to swipe a large number of false watching times, so that the hacker has a very high cost. Therefore, the user who steals the video watching times can be well identified through the information in the text.
Mode 2: for all videos of the video website, the user uploads the prepared videos to the server. The server firstly audits the video and adds the watermark of the video website into the video to prevent other websites from stealing the video. Therefore, in the invention, after the video is added with the watermark of the video website, a path of verification information is further added to the video, and the verification information is not played but only plays a verification role. And when inserting information, the invention makes the inserted information of each video different according to a certain algorithm. When the user terminal watches the video, the video content is downloaded, wherein the video content carries the verification information, only the player of the video website can decrypt the verification information, and the verification information is calculated to obtain a verification result and reported to the server. For other players of non-video websites, the player does not know that there is a piece of authentication information, and does not know how to calculate the authentication result, so that the server can identify and obtain the real watching times watched through the player of the video website.
Mode 3: it will be appreciated that for a normal user, the frequency with which he or she simultaneously views video is limited. For hackers, in order to forge a large number of viewing records, they would need to swipe the viewing records a large amount to gain revenue. The client obtains verification data through a certain amount of calculation, wherein the calculation of the verification data consumes CPU resources of the client, so that when the client concurrently watches videos, a large amount of calculation needs to be performed concurrently to consume the CPU resources, the concurrent number is limited, and the behavior of refreshing watching times of the client can be prevented. For normal users, normal watching of one-time video does not affect users, and concurrent watching of a large number of videos has great influence, so that the cost is increased. How to design the algorithm can enable the client to have a certain amount of calculation to obtain the verification result, and can not bypass the calculation, and meanwhile, the server can easily judge whether the result of the client is correct or not. The invention designs a set of algorithm to make the client have a certain amount of calculation, and the server is easy to identify the result of the client and does not consume the calculation resource of the server. First, the client and the server negotiate a shared key, and then the server generates a random string of 32 bits in length and a number of 0 s. These 2 data are eventually sent to the client. And encrypted with the previously negotiated shared key. After receiving the data of the server, the client decrypts the data of the server to obtain the random data character string and the number digit of 0 of the result data needing to be calculated. The client writes an algorithm to generate the result data needed by the server. The client side calculation includes that the unique device ID of the client side, the TOKEN data used when the client side logs in, the unique video ID watched at the client side currently, the random data issued by the server and the current system timestamp information are spliced together, and the random data of the client side is added to calculate the MD5 value, and the specific implementation mode is as follows:
md5result = Md5.Create (DeviceId + Token + videoId + rdata + Time + clientRandD); wherein DeviceId is the device unique ID of the client; wherein, token is the Token value when the client logs in the server; the videoId is the unique id of the video; rdata is random data issued by the server; the clientRandData is random data generated by the client. Finally, the result data of HASH is obtained through the md5 algorithm, and the server requires the number of the first 0 in the result data calculated by the client. For example, it is calculated as "2013dabcd6987abc4523654123451263". Since the first bit of the result data is 2 instead of 0, the client needs to generate random data to calculate the MD5 value until the start bit is 0, so as to meet the requirement of the server. Therefore, the calculation amount of the client generates random data continuously, and the MD5 value is calculated continuously until the requirement of the server is met. The server may also adjust the computation amount of the client, for example, the greater the number of initial 0 s, the greater the computation amount of the client. Making the client computation very complex. And after the client end completes the calculation of the result meeting the server, the result data and the data which the client end participates in the calculation are sent to the server. Then Md5result + DeviceId + Time + clientRandData are included. While other data includes the video unique ID and the token server itself has a record at login. The server verifies the client computing result. The client reports the result data meeting the server to the server, and the server checks according to the client data. Md5result = Md5.Create (devicel + Token + videoId + rdata + Time + clientRandData); and judging whether the Md5result is consistent with that of the client or not, judging whether the initial 0 number is satisfied or not, and if so, indicating that the result of the client is correct. And the server only needs to calculate the MD5 value once to know whether the result of the client is correct, because the client frequently calculates the MD5 value to obtain proper random data clientrandData, and the server knows the random data selected by the client from the result reported by the client, so that the server verification is simpler.
The embodiments of the present invention are described above from the perspective of an information processing method, and the embodiments of the present invention are described below from the perspective of a server and a client, respectively.
Referring to fig. 2, fig. 2 is a schematic diagram of an embodiment of a server according to an embodiment of the present invention, where the server specifically includes:
an obtaining unit 201, configured to obtain video data according to a current video played by a client;
the transceiving unit 202 is configured to send the video data to the client, so that the client obtains a client calculation result according to the video data;
the transceiver 202 is further configured to receive the client computing result sent by the client;
and the determining unit 203 is configured to determine that the current video watching record is a false record when the client calculation result is different from the server calculation result, and the server calculation result is a server calculation result calculated by the server according to the video data.
Optionally, in some possible implementations, the server further includes:
a generating unit 204, configured to negotiate with the client to generate a shared key, where the shared key is used to encrypt or decrypt communications between the server and the client.
Optionally, in some possible implementation manners, the generating unit 204 includes:
a generating module 2041, configured to generate a first public and private key pair according to the information of the current video, where the first public and private key pair includes a first public key and a first private key;
the transceiver module 2042 is configured to send the first public key to the client, so that the client generates a shared secret key according to the first public key;
the generating module 2041 is further configured to generate the shared secret key according to the first public key and a second public key, where the second public key is generated and sent by the client.
Optionally, in some possible implementation manners, the transceiver unit 202 is specifically configured to:
encrypting the video data according to the shared secret key to obtain encrypted video data; and sending the encrypted video data to the client.
Referring to fig. 3, fig. 3 is a schematic diagram of an embodiment of a client according to the present invention, where the client specifically includes:
a transceiving unit 301, configured to receive video data sent by a server, where the video data is obtained by the server according to a current video played by the client;
a generating unit 302, configured to generate a client computing result according to the video data;
the transceiving unit 301 is further configured to send the client computing result to the server, so that the server determines whether the record currently watching the current video is a fake record according to the client computing result.
Optionally, in some possible implementations, the generating unit 302 is further configured to: negotiating with the server to generate a shared key, wherein the shared key is used for encrypting or decrypting communication between the client and the video network server;
the client further comprises:
a decryption unit 303, configured to decrypt the video data according to the shared key.
Referring to fig. 4, fig. 4 is a schematic view of an embodiment of an electronic device according to an embodiment of the invention.
As shown in fig. 4, an embodiment of the present invention provides an electronic device, which includes a memory 410, a processor 420, and a computer program 411 stored in the memory 420 and running on the processor 420, and when the processor 420 executes the computer program 411, the following steps are implemented: acquiring video data according to a current video played by a client; the device sends the video data to the client so that the client obtains a client calculation result according to the video data; receiving the client computing result sent by the client; and when the client side calculation result is different from the server calculation result, determining that the current video watching record is a false record, and calculating by the server according to the video data to obtain a server calculation result according to the server calculation result.
Optionally, the processor is further configured to:
negotiating with the client to generate a shared key, the shared key being used to encrypt or decrypt communications between the server and the client.
Optionally, negotiating with the client to generate a shared key includes:
generating a first public and private key pair according to the information of the current video, wherein the first public and private key pair comprises a first public key and a first private key; sending the first public key to the client so that the client generates a shared secret key according to the first public key; and generating the shared secret key according to the first public key and a second public key, wherein the second public key is generated and sent by the client.
Optionally, sending the video data to the client includes: encrypting the video data according to the shared secret key to obtain encrypted video data; and sending the encrypted video data to the client.
Optionally, before generating the shared key according to the first public key and the second public key, the method further includes: determining, with the client, a generation algorithm for generating the shared key.
In a specific implementation process, when the processor 420 executes the computer program 411, any of the embodiments corresponding to fig. 1 may be implemented.
Since the electronic device described in this embodiment is a device used for implementing one of the servers in the embodiment of the present invention, based on the method described in the embodiment of the present invention, those skilled in the art can understand the specific implementation manner of the electronic device in this embodiment and various variations thereof, so that how to implement the method in the embodiment of the present invention by the electronic device is not described in detail herein, and as long as the device used for implementing the method in the embodiment of the present invention by those skilled in the art is within the scope of the present invention to be protected.
Referring to fig. 5, fig. 5 is a schematic diagram illustrating an embodiment of a computer-readable storage medium according to the present invention.
As shown in fig. 5, the present embodiment provides a computer-readable storage medium 500 having a computer program 511 stored thereon, the computer program 511 implementing the following steps when executed by a processor: acquiring video data according to a current video played by a client; sending the video data to the client so that the client obtains a client calculation result according to the video data; receiving the client computing result sent by the client; and when the client side calculation result is different from the server calculation result, determining that the current video watching record is a false record, and calculating by the server according to the video data to obtain a server calculation result according to the server calculation result.
Optionally, the computer program 511 is further configured to, when executed by the processor, implement the following steps:
negotiating with the client to generate a shared key, the shared key being used to encrypt or decrypt communications between the server and the client.
Optionally, the computer program 511 is further configured to, when executed by the processor, implement the following steps: generating a first public and private key pair according to the information of the current video, wherein the first public and private key pair comprises a first public key and a first private key; sending the first public key to the client so that the client generates a shared secret key according to the first public key; and generating the shared secret key according to the first public key and a second public key, wherein the second public key is generated and sent by the client.
Optionally, the computer program 511 is further configured to, when executed by the processor, implement the following steps: encrypting the video data according to the shared secret key to obtain encrypted video data; and sending the encrypted video data to the client.
Optionally, the computer program 511 is further configured to, when executed by the processor, implement the following steps: determining, with the client, a generation algorithm for generating the shared key.
Referring to fig. 6, a schematic diagram of another electronic device according to an embodiment of the invention is shown.
As shown in fig. 6, an embodiment of the present invention provides an electronic device, which includes a memory 610, a processor 620, and a computer program 611 stored in the memory 620 and capable of running on the processor 620, where the processor 620 implements the following steps when executing the computer program 611: receiving video data sent by a server, wherein the video data are obtained by the server according to a current video played by the client; generating a client calculation result according to the video data; and sending the client calculation result to the server so that the server determines whether the current video watching record is a false record according to the client calculation result.
Optionally, the processor 620 is further configured to perform:
negotiating with the server to generate a shared key, wherein the shared key is used for encrypting or decrypting communication between the client and the video network server;
after receiving the video data sent by the server, and before generating a client computing result according to the video data, the processor 620 is further configured to:
and decrypting the video data according to the shared secret key.
In a specific implementation, when the processor 620 executes the computer program 611, any of the embodiments corresponding to fig. 1 may be implemented.
Since the electronic device described in this embodiment is a device used for implementing one of the clients in the embodiment of the present invention, based on the method described in the embodiment of the present invention, those skilled in the art can understand the specific implementation manner of the electronic device of this embodiment and various variations thereof, so that how to implement the method in the embodiment of the present invention by the electronic device is not described in detail herein, and as long as the device used for implementing the method in the embodiment of the present invention by the person skilled in the art belongs to the intended protection scope of the present invention.
Referring to fig. 7, fig. 7 is a schematic diagram illustrating an embodiment of a computer-readable storage medium according to the present invention.
As shown in fig. 7, the present embodiment provides a computer-readable storage medium 700 having a computer program 711 stored thereon, the computer program 711, when executed by a processor, implementing the steps of: receiving video data sent by a server, wherein the video data are obtained by the server according to a current video played by the client; generating a client calculation result according to the video data; and sending the client calculation result to the server so that the server determines whether the current video watching record is a false record according to the client calculation result.
Optionally, the computer program 711, when executed by the processor, implements the following steps:
negotiating with the server to generate a shared key, wherein the shared key is used for encrypting or decrypting communication between the client and the video network server;
after receiving the video data sent by the server, and before generating a client computing result from the video data, the computer program 711, when executed by the processor, implements the following steps:
decrypting the video data according to the shared key.
It should be noted that, in the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to relevant descriptions of other embodiments for parts that are not described in detail in a certain embodiment.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (9)

1. An information processing method characterized by comprising:
the server obtains the video frame number of the current video and the current frame number information according to the current video played by the client;
the server generates a section of random data, randomly selects a video starting frame number from the playing time of the current video, and acquires the video frame number to be read from the current frame number information of the current video; packing the random data, the video starting frame number and the video frame number needing to be read as video data; the video data comprises random data, initial frame data and frame numbers required to be calculated;
the server sends the video data to a client so that the client can obtain a client calculation result according to the video starting frame number and the video frame number needing to be calculated;
the server receives the client-side calculation result sent by the client side;
and when the client calculation result is different from the server calculation result, the server determines that the current video watching record is a false record, and the server calculation result is obtained by the server according to the video data calculation.
2. The method of claim 1, further comprising:
the server and the client negotiate to generate a shared key, and the shared key is used for encrypting or decrypting communication between the server and the client.
3. The method of claim 2, wherein negotiating, by the server and the client, for generating a shared key comprises:
the server generates a first public and private key pair according to the information of the current video, wherein the first public and private key pair comprises a first public key and a first private key;
the server sends the first public key to the client, so that the client generates a shared secret key according to the first public key;
and the server generates the shared secret key according to the first public key and a second public key, and the second public key is generated and sent by the client.
4. The method of claim 2 or 3, wherein the server sending the video data to the client comprises:
the server encrypts the video data according to the shared secret key to obtain encrypted video data;
and the server sends the encrypted video data to the client.
5. An information processing method, characterized by comprising:
the client receives video data sent by the server; the server generates a section of random data, randomly selects a video starting frame number from the playing time of the current video, and acquires the video frame number to be read from the current frame number information of the current video; the video data is obtained by packaging the random data, the video starting frame number and the video frame number needing to be read by the server; the video data comprises random data, initial frame data and the number of frames to be calculated;
the client generates a client calculation result according to the video starting frame number and the video frame number needing to be calculated;
and the client sends the client calculation result to the server so that the server determines whether the current video watching record is a false record according to the client calculation result.
6. The method of claim 5, further comprising:
the client and the server negotiate to generate a shared secret key, and the shared secret key is used for encrypting or decrypting communication between the client and the server;
after the client receives the video data sent by the server, and before the client generates a client calculation result according to the video data, the method further comprises:
and the client decrypts the video data according to the shared secret key.
7. A server, comprising:
the obtaining unit is used for obtaining the video frame number of the current video and the current frame number information according to the current video played by the client;
the server generates a section of random data, randomly selects a video starting frame number from the playing time of the current video, and acquires the video frame number to be read from the current frame number information of the current video; packing the random data, the video starting frame number and the video frame number needing to be read as video data; the video data comprises random data, initial frame data and the number of frames to be calculated; the receiving and sending unit is used for sending the video data to a client so that the client can obtain a client calculation result according to the video starting frame number and the video frame number needing to be calculated;
the receiving and sending unit is also used for receiving the client-side calculation result sent by the client side;
and the determining unit is used for determining that the current video watching record is a false record when the client side calculation result is different from the server calculation result, and the server calculation result is obtained by the server according to the video data calculation.
8. A client, comprising:
the receiving and sending unit is used for receiving video data sent by the server, the server generates a section of random data, randomly selects a video starting frame number from the playing time of the current video, and acquires the video frame number to be read from the current frame number information of the current video; the video data is obtained by packaging the random data, the video starting frame number and the video frame number needing to be read by the server; the video data comprises random data, initial frame data and frame numbers required to be calculated;
the generating unit is used for generating a client computing result according to the video starting frame number and the video frame number needing to be computed;
the receiving and sending unit is further configured to send a client calculation result to the server, so that the server determines whether the current video watching record is a false record according to the client calculation result.
9. A computer-readable storage medium comprising instructions that, when executed on a computer, cause the computer to perform the method of any of claims 1-6.
CN201810332146.4A 2018-04-13 2018-04-13 Information processing method and related equipment Active CN110380843B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810332146.4A CN110380843B (en) 2018-04-13 2018-04-13 Information processing method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810332146.4A CN110380843B (en) 2018-04-13 2018-04-13 Information processing method and related equipment

Publications (2)

Publication Number Publication Date
CN110380843A CN110380843A (en) 2019-10-25
CN110380843B true CN110380843B (en) 2022-12-02

Family

ID=68242997

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810332146.4A Active CN110380843B (en) 2018-04-13 2018-04-13 Information processing method and related equipment

Country Status (1)

Country Link
CN (1) CN110380843B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259371B (en) * 2020-01-13 2023-08-18 平安科技(深圳)有限公司 Internet of things equipment authentication method, electronic device and storage medium
CN113595741B (en) * 2021-08-02 2023-04-07 杭州叙简科技股份有限公司 Credible data chain generation system and method based on 5G law enforcement recorder

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103327016A (en) * 2013-06-06 2013-09-25 合一信息技术(北京)有限公司 Method and system for calculating and correcting abnormal playing amount of network streaming media
CN106651475A (en) * 2017-02-22 2017-05-10 广州万唯邑众信息科技有限公司 Method and system for identifying false traffic of mobile video advertisement
CN106789985A (en) * 2016-12-08 2017-05-31 武汉斗鱼网络科技有限公司 Client validation method and system based on GPU algorithms
CN107454110A (en) * 2017-09-26 2017-12-08 武汉斗鱼网络科技有限公司 A kind of data verification method and server
CN107566897A (en) * 2017-07-19 2018-01-09 北京奇艺世纪科技有限公司 A kind of discrimination method, device and the electronic equipment of video brush amount

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170171745A1 (en) * 2015-12-09 2017-06-15 Qualcomm Incorporated Privacy protection in wireless networks
CN106803997B (en) * 2017-03-14 2019-12-17 广州视源电子科技股份有限公司 system and method for detecting client playing state in audio and video live broadcast
CN107613314B (en) * 2017-10-09 2019-09-20 武汉斗鱼网络科技有限公司 A kind of method and device detecting brush popularity behavior in live streaming

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103327016A (en) * 2013-06-06 2013-09-25 合一信息技术(北京)有限公司 Method and system for calculating and correcting abnormal playing amount of network streaming media
CN106789985A (en) * 2016-12-08 2017-05-31 武汉斗鱼网络科技有限公司 Client validation method and system based on GPU algorithms
CN106651475A (en) * 2017-02-22 2017-05-10 广州万唯邑众信息科技有限公司 Method and system for identifying false traffic of mobile video advertisement
CN107566897A (en) * 2017-07-19 2018-01-09 北京奇艺世纪科技有限公司 A kind of discrimination method, device and the electronic equipment of video brush amount
CN107454110A (en) * 2017-09-26 2017-12-08 武汉斗鱼网络科技有限公司 A kind of data verification method and server

Also Published As

Publication number Publication date
CN110380843A (en) 2019-10-25

Similar Documents

Publication Publication Date Title
CN108881966B (en) Information processing method and related equipment
US11055429B2 (en) Key providing method, video playing method, server and client
Ma et al. Blockchain for digital rights management
WO2018177110A1 (en) Media content licensing method and device
KR100752796B1 (en) Method and apparatus for authenticating time-sensitive interactive communications
CN101977190B (en) Digital content encryption transmission method and server side
US7865723B2 (en) Method and apparatus for multicast delivery of program information
CN103237010B (en) The server end of digital content is cryptographically provided
WO2008134463A1 (en) Method and apparatus for assisting with content key changes
CN101350918A (en) Method for protecting copyright of video content
CN108769749B (en) Method for determining data embezzlement, client and server
CN108650526B (en) Identification method, computer equipment and storage medium
CN108259183B (en) Attention method, attention device, attention electronic equipment and attention medium
CN108768920B (en) Recorded broadcast data processing method and device
US8495154B2 (en) Content usage tracking in superdistribution
CN110380843B (en) Information processing method and related equipment
CN103237011B (en) Digital content encryption transmission method and server end
US8196214B2 (en) Method and apparatus for securing content using encryption with embedded key in content
CN110381342B (en) Information processing method and related equipment
CN108769748B (en) Information processing method and related equipment
CN113014956B (en) Video playing method and device
CN110381375B (en) Method for determining data embezzlement, client and server
CN110691267B (en) TLS-based video stream address authentication method, storage medium, equipment and system
CN112769783A (en) Data transmission method, cloud server, receiving end and sending end
KR20090090356A (en) Method for managing the number of visualisations, security processor and terminal for said method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231222

Address after: 21032, 9th Floor, Building 2, Micro World, No. 23 Century Avenue, Liuwu New District, Lhasa, Tibet Autonomous Region, 850000

Patentee after: Tibet Zhaoxun Technology Engineering Co.,Ltd.

Address before: 430000 East Lake Development Zone, Wuhan City, Hubei Province, No. 1 Software Park East Road 4.1 Phase B1 Building 11 Building

Patentee before: WUHAN DOUYU NETWORK TECHNOLOGY Co.,Ltd.