CN110381021A - A kind of method, apparatus, electronic equipment and the storage medium of anti-rogue attacks - Google Patents

A kind of method, apparatus, electronic equipment and the storage medium of anti-rogue attacks Download PDF

Info

Publication number
CN110381021A
CN110381021A CN201910512044.5A CN201910512044A CN110381021A CN 110381021 A CN110381021 A CN 110381021A CN 201910512044 A CN201910512044 A CN 201910512044A CN 110381021 A CN110381021 A CN 110381021A
Authority
CN
China
Prior art keywords
media server
streaming media
browser end
dynamic key
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910512044.5A
Other languages
Chinese (zh)
Other versions
CN110381021B (en
Inventor
谢文龙
胡倩丽
李云鹏
沈军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Visionvera Information Technology Co Ltd
Original Assignee
Visionvera Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Visionvera Information Technology Co Ltd filed Critical Visionvera Information Technology Co Ltd
Priority to CN201910512044.5A priority Critical patent/CN110381021B/en
Publication of CN110381021A publication Critical patent/CN110381021A/en
Application granted granted Critical
Publication of CN110381021B publication Critical patent/CN110381021B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/06Network architectures or network communication protocols for network security for supporting key management in a packet data network
    • H04L63/068Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/40Support for services or applications

Abstract

The present invention provides method, apparatus, electronic equipment and the storage mediums of a kind of anti-rogue attacks.The described method includes: determining that user account logs in the log duration of streaming media server by the first browser end, in the case where log duration reaches preset duration, dynamic key request is sent to streaming media server, interact depending on networking data with streaming media server based on dynamic key, and reset log duration, in the case that log duration after a reset reaches preset duration, new dynamic key request is sent, to streaming media server interact depending on networking data with streaming media server based on the new dynamic key that streaming media server is sent.Using the present invention program, key when carrying out data interaction between browser end and streaming media server is dynamic change, so that the difficulty for wanting user's breaking cryptographic keys of rogue attacks improves, a possibility that key is cracked is reduced, to achieve the purpose that anti-rogue attacks.

Description

A kind of method, apparatus, electronic equipment and the storage medium of anti-rogue attacks
Technical field
The present invention relates to field of communication technology more particularly to a kind of method, apparatus of anti-rogue attacks, electronic equipment and deposit Storage media.
Background technique
It is a real-time exchange platform depending on networking, is the more advanced form of internet, depending on networks numerous Internet applications Push HD video to, unitize, high definition is face-to-face.It will finally realize that the world without distance, realizes person to person in global range Distance apart from an only screen;On the other hand, have flexible, the simple and low price of packet switch depending on networking, be provided simultaneously with The quality and safety assurance of circuit switching, realize the whole network switched virtual circuit and data for the first time on communication history The seamless connection of format.
Streaming media server: abbreviation Streaming Media, major function are to transmission audio, video and multimedia file in network Media content is acquired, caches, dispatches and transmits broadcasting, full-featured and powerful, can be used as view intranet network and mutually Intranet network carries out the server of data interaction, is widely used in view networking and internet.
Substantially it is divided to two kinds by the method for accessing depending on intranet network and configuring streaming media server at present, one is directly exist Various access and configuration operation are carried out on streaming media server;Another kind is remotely accessed and is matched by tools such as browsers Set operation.But safety when by the remote access of the tools such as browser and configuration operation is relatively low, it is easy to by success attack, Leaking data is caused, the data safety of operation user and streaming media server is seriously threatened.
Summary of the invention
Method, apparatus, electronic equipment and the storage medium of a kind of anti-rogue attacks provided by the invention, greatly improve The safety of user data and streaming media server data when remote access and configuration streaming media server operation.
In order to solve the above-mentioned technical problem, the embodiment of the invention provides a kind of method of anti-rogue attacks, the methods Applied to the first browser end, first browser end is installed on the first view networked devices, which comprises
Determine that user account logs in the log duration of streaming media server by first browser end;
In the case where the log duration reaches preset duration, Xiang Suoshu streaming media server sends dynamic key and asks It asks, the dynamic key request is for the streaming media server request dynamic key, the dynamic key to be described first Browser end carries out the encryption key interacted depending on networking data with the streaming media server;
Receive the dynamic key that the streaming media server is sent;
When interact depending on networking data with the streaming media server based on the dynamic key, and resetting the login It is long;
In the case that log duration after a reset reaches the preset duration, Xiang Suoshu streaming media server sends new Dynamic key request, is regarded with the new dynamic key and the streaming media server that are sent based on the streaming media server Networking data interaction.
Optionally it is determined that user account logs in the log duration of streaming media server, packet by first browser end It includes:
When the user account successfully logs in the streaming media server by first browser end, start timing The log duration that device logs in the streaming media server to the user account carries out timing;
When the duration of the timer record being determined as the user account logging in the login of the streaming media server It is long.
Optionally, determine user account by first browser end log in streaming media server log duration it Afterwards, the method also includes:
The login authorization requests that the streaming media server is sent are received, the login authorization requests characterize user's account Number the streaming media server is logged in by the request of the second browser end, second browser end is installed on second and sets depending on networking It is standby upper;
In the case where not allowing the user account to log in by second browser end, Xiang Suoshu streaming media service Device sends dynamic key and updates request, and the dynamic key updates request and updates dynamic for requesting to the streaming media server Key;
The updated dynamic key that the streaming media server is sent is received, and is based on the updated dynamic key Interact depending on networking data with the streaming media server.
Optionally, after receiving the login authorization requests that the streaming media server is sent, the method also includes:
In the case where allowing the user account to log in by second browser end, Xiang Suoshu streaming media server Dynamic key forwarding instruction is sent, it is clear to described second that the dynamic key forwarding instruction is used to indicate the streaming media server Look at device end send dynamic key so that second browser end be based on the dynamic key regarded with the streaming media server Networking data interaction.
The embodiment of the invention also provides the method for another anti-rogue attacks, the method is applied to streaming media service Device, which comprises
The dynamic key request of the first browser end transmission is received, the dynamic key request is passes through institute in user account State the first browser end log in the streaming media server log duration reach preset duration in the case where, it is clear by described first Look at the request of device end transmission, first browser end is installed on the first view networked devices;
It is requested according to the dynamic key, the first browser end of Xiang Suoshu sends the dynamic key;
Interact depending on networking data with first browser end based on the dynamic key;
The new dynamic key request that first browser end is sent is received, the new dynamic key request is Login after the user account logs in the log duration resetting of the streaming media server by first browser end In the case that duration reaches the preset duration, by the request of first browser end transmission;
According to the new dynamic key request, the first browser end of Xiang Suoshu sends the new dynamic key;
Interact depending on networking data with first browser end based on the new dynamic key.
Optionally, the method also includes:
When receiving the logging request that user account is sent by the second browser end, the first browser end of Xiang Suoshu hair Corresponding login authorization requests are sent, second browser end is installed on the second view networked devices;
It receives the dynamic key that first browser end is sent and updates request, the dynamic key updates request for not In the case where allowing the user account to log in by second browser end, the request of Xiang Suoshu streaming media server updates dynamic The request of state key;
It updates and requests in response to the dynamic key, it is close that the first browser end of Xiang Suoshu sends the updated dynamic Key;
Interact depending on networking data with first browser end based on the updated dynamic key.
Optionally, after sending corresponding login authorization requests to first browser end, the method also includes:
The dynamic key forwarding instruction that first browser end is sent is received, the dynamic key forwarding instructs permitting In the case that the described user account is logged in by second browser end, indicate the streaming media server to described second perhaps The instruction of browser end transmission dynamic key;
It forwards and instructs in response to the dynamic key, the second browser end of Xiang Suoshu sends dynamic key, so that the stream Media server is based on the dynamic key and interact depending on networking data with second browser end.
The embodiment of the invention also provides a kind of device of anti-rogue attacks, described device is applied to the first browser end, First browser end is installed on the first view networked devices, and described device includes:
Duration module is determined, for determining that user account logs in stepping on for streaming media server by first browser end Record duration;
Dynamic key request module is sent, in the case where the log duration reaches preset duration, to the stream Media server sends dynamic key request, and the dynamic key request is for close to the streaming media server request dynamic Key, it is close that the dynamic key is that first browser end with the streaming media server carries out the encryption interacted depending on networking data Key;
Dynamic key module is received, the dynamic key sent for receiving the streaming media server;
Interaction resetting module is handed over for carrying out view networking data based on the dynamic key and the streaming media server Mutually, and the log duration is reset;
New key interactive module, in the case where reaching the preset duration for log duration after a reset, Xiang Suoshu Streaming media server sends new dynamic key request, with the new dynamic key sent based on the streaming media server and institute It states streaming media server and carries out view networking data interaction.
Optionally, the determining duration module includes:
Start timer submodule, for successfully logging in the stream by first browser end in the user account When media server, the log duration that starting timer logs in the streaming media server to the user account carries out timing;
It determines duration submodule, logs in the stream for the duration of the timer record to be determined as the user account The log duration of media server.
Optionally, described device further include:
Authorization request module is received, the login authorization requests sent for receiving the streaming media server, the login Authorization requests characterize the user account and log in the streaming media server, second browsing by the request of the second browser end Device end is installed on the second view networked devices;
It sends and updates cipher key module, in the feelings for not allowing the user account to log in by second browser end Under condition, Xiang Suoshu streaming media server sends dynamic key and updates request, and the dynamic key updates request for the stream Media server request updates dynamic key;
Cipher key interaction module is updated, the updated dynamic key sent for receiving the streaming media server, and base Interact depending on networking data with the streaming media server in the updated dynamic key.
Optionally, described device further include:
Instruction module is forwarded, is used in the case where allowing the user account to log in by second browser end, Dynamic key forwarding instruction is sent to the streaming media server, the dynamic key forwarding instruction is used to indicate the Streaming Media Server to second browser end send dynamic key so that second browser end be based on the dynamic key with it is described Streaming media server carries out view networking data interaction.
The embodiment of the invention also provides the device of another anti-rogue attacks, described device is applied to streaming media service Device, described device include:
First end request module is received, for receiving the dynamic key request of the first browser end transmission, the dynamic is close Key request is to reach default by the log duration that first browser end logs in the streaming media server in user account In the case where duration, the request sent by first browser end, first browser end is installed on first and sets depending on networking It is standby upper;
First end cipher key module is sent, for requesting according to the dynamic key, the first browser end of Xiang Suoshu sends institute State dynamic key;
Data interaction module is handed over for carrying out view networking data based on the dynamic key and first browser end Mutually;
Cipher key module after resetting is received, is asked for receiving the new dynamic key that first browser end is sent It asks, the new dynamic key request is to pass through first browser end in the user account to log in the streaming media service In the case that log duration after the log duration resetting of device reaches the preset duration, sent by first browser end Request;
New key module is sent, for requesting according to the new dynamic key, the first browser end of Xiang Suoshu sends institute State new dynamic key;
First end interactive module, for carrying out view networking number based on the new dynamic key and first browser end According to interaction.
Optionally, described device further include:
Receive second end request module, for receive user account pass through the second browser end send logging request When, the first browser end of Xiang Suoshu sends corresponding login authorization requests, and second browser end is installed on the networking of the second view In equipment;
First end update module is received, updates request, institute for receiving the dynamic key that first browser end is sent Stating dynamic key to update request is in the case where not allowing the user account to log in by second browser end, to institute State the request that streaming media server request updates dynamic key;
Response sends update module, requests for updating in response to the dynamic key, the first browser end of Xiang Suoshu hair Send the updated dynamic key;
Interactive module after update, for carrying out view connection based on the updated dynamic key and first browser end Network data interaction.
Optionally, described device further include:
First end forwarding module is received, the dynamic key forwarding instruction sent for receiving first browser end, institute Dynamic key forwarding instruction is stated to indicate institute in the case where allowing the user account to log in by second browser end State the instruction that streaming media server sends dynamic key to second browser end;
Response sends cipher key interaction module, instructs for forwarding in response to the dynamic key, the second browser of Xiang Suoshu End sends dynamic key, so that the streaming media server is based on the dynamic key and second browser end carries out view networking Data interaction.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, the program It realizes when being executed by processor such as the step in the process described above of the present invention.
The embodiment of the present invention also provides a kind of electronic equipment, including memory, processor and storage are on a memory and can The computer program run on a processor realizes the step in the process described above of the present invention when the processor executes.
Using the method for the anti-rogue attacks that invention provides, the case where user account log duration reaches preset duration Under, dynamic key request is sent from the first browser end to streaming media server, and be based on dynamic key and streaming media server View networking data interaction is carried out, the first browser end resets log duration simultaneously, and log duration after a reset reaches pre- again If in the case where duration, new dynamic key request is sent to streaming media server, based on new dynamic key and Streaming Media Server carries out view networking data interaction.Using the present invention program, data are carried out between browser end and streaming media server Key when interaction is dynamic change, that is, when every the arrivals preset duration of user account log duration, all one keys of replacement, So that the difficulty for wanting user's breaking cryptographic keys of rogue attacks is greatly improved, a possibility that key is cracked is reduced, from And achieve the purpose that anti-rogue attacks.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings Obtain other attached drawings.
Fig. 1 is a kind of networking schematic diagram of view networking of the invention;
Fig. 2 is a kind of hardware structural diagram of node server of the invention;
Fig. 3 is a kind of hardware structural diagram of access switch of the invention;
Fig. 4 is the hardware structural diagram that a kind of Ethernet association of the invention turns gateway;
Fig. 5 is a kind of flow chart of the method for anti-rogue attacks of the embodiment of the present invention;
Fig. 6 is a kind of another flow chart of the method for anti-rogue attacks of the embodiment of the present invention;
Fig. 7 is the flow chart of the method for another anti-rogue attacks of the embodiment of the present invention;
Fig. 8 is the schematic diagram of the system of the anti-rogue attacks of the embodiment of the present invention;
Fig. 9 is a kind of block diagram of the device of anti-rogue attacks of the embodiment of the present invention;
Figure 10 is the block diagram of the device of another anti-rogue attacks of the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts Example, shall fall within the protection scope of the present invention.
It is the important milestone of network Development depending on networking, is a real-time network, can be realized HD video real-time Transmission, Push numerous Internet applications to HD video, high definition is face-to-face.
Real-time high-definition video switching technology is used depending on networking, it can be such as high in a network platform by required service Clear video conference, Intellectualized monitoring analysis, emergency command, digital broadcast television, delay TV, the Web-based instruction, shows video monitoring Field live streaming, VOD program request, TV Mail, individual character records (PVR), Intranet (manages) channel by oneself, intelligent video Broadcast Control, information publication All be incorporated into a system platform etc. services such as tens of kinds of videos, voice, picture, text, communication, data, by TV or Computer realizes that high-definition quality video plays.
Embodiment in order to enable those skilled in the art to better understand the present invention is introduced to depending on networking below:
Depending on networking, applied portion of techniques is as described below:
Network technology (Network Technology)
Traditional ethernet (Ethernet) is improved depending on the network technology innovation networked, with potential huge on network Video flow.(Circuit is exchanged different from simple network packet packet switch (Packet Switching) or lattice network Switching), Streaming demand is met using Packet Switching depending on networking technology.Has grouping depending on networking technology Flexible, the simple and low price of exchange, is provided simultaneously with the quality and safety assurance of circuit switching, it is virtually electric to realize the whole network switch type The seamless connection of road and data format.
Switching technology (Switching Technology)
Two advantages of asynchronous and packet switch that Ethernet is used depending on networking eliminate Ethernet under the premise of complete compatible and lack It falls into, has the end-to-end seamless connection of the whole network, direct user terminal, directly carrying IP data packet.User data is in network-wide basis It is not required to any format conversion.It is the more advanced form of Ethernet depending on networking, is a real-time exchange platform, can be realized at present mutually The whole network large-scale high-definition realtime video transmission that networking cannot achieve pushes numerous network video applications to high Qinghua, unitizes.
Server technology (Server Technology)
It is different from traditional server, its Streaming Media depending on the server technology in networking and unified video platform Transmission be built upon it is connection-oriented on the basis of, data-handling capacity is unrelated with flow, communication time, single network layer energy Enough transmitted comprising signaling and data.For voice and video business, handled depending on networking and unified video platform Streaming Media Complexity many simpler than data processing, efficiency substantially increase hundred times or more than traditional server.
Reservoir technology (Storage Technology)
The ultrahigh speed reservoir technology of unified video platform in order to adapt to the media content of vast capacity and super-flow and Using state-of-the-art real time operating system, the programme information in server instruction is mapped to specific hard drive space, media Content is no longer pass through server, and moment is directly delivered to user terminal, and user waits typical time less than 0.2 second.It optimizes Sector distribution greatly reduces the mechanical movement of hard disc magnetic head tracking, and resource consumption only accounts for the 20% of the internet ad eundem IP, but The concurrent flow greater than 3 times of traditional disk array is generated, overall efficiency promotes 10 times or more.
Network security technology (Network Security Technology)
Depending on the structural design networked by servicing independent licence system, equipment and the modes such as user data is completely isolated every time The network security problem that puzzlement internet has thoroughly been eradicated from structure, does not need antivirus applet, firewall generally, has prevented black The attack of visitor and virus, structural carefree secure network is provided for user.
It services innovative technology (Service Innovation Technology)
Business and transmission are fused together by unified video platform, whether single user, private user or a net The sum total of network is all only primary automatic connection.User terminal, set-top box or PC are attached directly to unified video platform, obtain rich The multimedia video service of rich colorful various forms.Unified video platform is traditional to substitute with table schema using " menu type " Complicated applications programming, considerably less code, which can be used, can be realized complicated application, realize the new business innovation of " endless ".
Networking depending on networking is as described below:
It is a kind of central controlled network structure depending on networking, which can be Tree Network, Star network, ring network etc. class Type, but centralized control node is needed to control whole network in network on this basis.
As shown in Figure 1, being divided into access net and Metropolitan Area Network (MAN) two parts depending on networking.
The equipment of access mesh portions can be mainly divided into 3 classes: node server, access switch, terminal (including various machines Top box, encoding board, memory etc.).Node server is connected with access switch, and access switch can be with multiple terminal phases Even, and it can connect Ethernet.
Wherein, node server is the node that centralized control functions are played in access net, can control access switch and terminal. Node server can directly be connected with access switch, can also directly be connected with terminal.
Similar, the equipment of metropolitan area mesh portions can also be divided into 3 classes: metropolitan area server, node switch, node serve Device.Metropolitan area server is connected with node switch, and node switch can be connected with multiple node servers.
Wherein, node server is the node server for accessing mesh portions, i.e. node server had both belonged to access wet end Point, and belong to metropolitan area mesh portions.
Metropolitan area server is the node that centralized control functions are played in Metropolitan Area Network (MAN), can control node switch and node serve Device.Metropolitan area server can be directly connected to node switch, can also be directly connected to node server.
It can be seen that be entirely a kind of central controlled network structure of layering depending on networking network, and node server and metropolitan area The network controlled under server can be the various structures such as tree-shaped, star-like, cyclic annular.
Visually claim, access mesh portions can form unified video platform (part in virtual coil), and multiple unified videos are flat Platform can form view networking;Each unified video platform can be interconnected by metropolitan area and wide area depending on networking.
Classify depending on networked devices
1.1 embodiment of the present invention can be mainly divided into 3 classes: server depending on the equipment in networking, interchanger (including ether Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).Depending on networking can be divided on the whole Metropolitan Area Network (MAN) (or National net, World Wide Web etc.) and access net.
1.2 equipment for wherein accessing mesh portions can be mainly divided into 3 classes: node server, access switch (including ether Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).
The specific hardware structure of each access network equipment are as follows:
Node server:
As shown in Fig. 2, mainly including Network Interface Module 201, switching engine module 202, CPU module 203, disk array Module 204;
Wherein, Network Interface Module 201, the Bao Jun that CPU module 203, disk array module 204 are come in enter switching engine Module 202;Switching engine module 202 look into the operation of address table 205 to the packet come in, to obtain the navigation information of packet; And the packet is stored according to the navigation information of packet the queue of corresponding pack buffer 206;If the queue of pack buffer 206 is close It is full, then it abandons;All pack buffer queues of 202 poll of switching engine mould, are forwarded: 1) port if meeting the following conditions It is less than to send caching;2) the queue package counting facility is greater than zero.Disk array module 204 mainly realizes the control to hard disk, including The operation such as initialization, read-write to hard disk;CPU module 203 is mainly responsible between access switch, terminal (not shown) Protocol processes, to address table 205 (including descending protocol packet address table, uplink protocol package address table, data packet addressed table) Configuration, and, the configuration to disk array module 204.
Access switch:
As shown in figure 3, mainly including Network Interface Module (downstream network interface module 301, uplink network interface module 302), switching engine module 303 and CPU module 304;
Wherein, the packet (upstream data) that downstream network interface module 301 is come in enters packet detection module 305;Packet detection mould Whether mesh way address (DA), source address (SA), type of data packet and the packet length of the detection packet of block 305 meet the requirements, if met, It then distributes corresponding flow identifier (stream-id), and enters switching engine module 303, otherwise abandon;Uplink network interface mould The packet (downlink data) that block 302 is come in enters switching engine module 303;The data packet that CPU module 304 is come in enters switching engine Module 303;Switching engine module 303 look into the operation of address table 306 to the packet come in, to obtain the navigation information of packet; If the packet into switching engine module 303 is that downstream network interface is gone toward uplink network interface, in conjunction with flow identifier (stream-id) packet is stored in the queue of corresponding pack buffer 307;If the queue of the pack buffer 307 is close full, It abandons;If the packet into switching engine module 303 is not that downstream network interface is gone toward uplink network interface, according to packet Navigation information is stored in the data packet queue of corresponding pack buffer 307;If the queue of the pack buffer 307 is close full, Then abandon.
All pack buffer queues of 303 poll of switching engine module, are divided to two kinds of situations in embodiments of the present invention:
If the queue is that downstream network interface is gone toward uplink network interface, meets the following conditions and be forwarded: 1) It is less than that the port sends caching;2) the queue package counting facility is greater than zero;3) token that rate control module generates is obtained;
If the queue is not that downstream network interface is gone toward uplink network interface, meets the following conditions and is forwarded: 1) it is less than to send caching for the port;2) the queue package counting facility is greater than zero.
Rate control module 308 is configured by CPU module 304, to all downlink networks in programmable interval Interface generates token toward the pack buffer queue that uplink network interface is gone, to control the code rate of forwarded upstream.
CPU module 304 is mainly responsible for the protocol processes between node server, the configuration to address table 306, and, Configuration to rate control module 308.
Ethernet association turns gateway:
As shown in figure 4, mainly including Network Interface Module (downstream network interface module 401, uplink network interface module 402), switching engine module 403, CPU module 404, packet detection module 405, rate control module 408, address table 406, Bao Huan Storage 407 and MAC adding module 409, MAC removing module 410.
Wherein, the data packet that downstream network interface module 401 is come in enters packet detection module 405;Packet detection module 405 is examined Ethernet mac DA, ethernet mac SA, Ethernet length or frame type, the view networking mesh way address of measured data packet DA, whether meet the requirements depending on networking source address SA, depending on networking data Packet type and packet length, corresponding stream is distributed if meeting Identifier (stream-id);Then, MAC DA, MAC SA, length or frame type are subtracted by MAC removing module 410 (2byte), and enter corresponding receive and cache, otherwise abandon;
Downstream network interface module 401 detects the transmission caching of the port, according to the view of packet networking mesh if there is Bao Ze Address D A knows the ethernet mac DA of corresponding terminal, adds the ethernet mac DA of terminal, Ethernet assists the MAC for turning gateway SA, Ethernet length or frame type, and send.
The function that Ethernet association turns other modules in gateway is similar with access switch.
Terminal:
It mainly include Network Interface Module, Service Processing Module and CPU module;For example, set-top box mainly connects including network Mouth mold block, video/audio encoding and decoding engine modules, CPU module;Encoding board mainly includes Network Interface Module, video encoding engine Module, CPU module;Memory mainly includes Network Interface Module, CPU module and disk array module.
The equipment of 1.3 metropolitan area mesh portions can be mainly divided into 2 classes: node server, node switch, metropolitan area server. Wherein, node switch mainly includes Network Interface Module, switching engine module and CPU module;Metropolitan area server mainly includes Network Interface Module, switching engine module and CPU module are constituted.
2, networking data package definition is regarded
2.1 access network data package definitions
Access net data packet mainly include following sections: destination address (DA), source address (SA), reserve bytes, payload(PDU)、CRC。
As shown in the table, the data packet for accessing net mainly includes following sections:
DA SA Reserved Payload CRC
Wherein:
Destination address (DA) is made of 8 bytes (byte), and first character section indicates type (such as the various associations of data packet Discuss packet, multicast packet, unicast packet etc.), be up to 256 kinds of possibility, the second byte to the 6th byte is metropolitan area net address, Seven, the 8th bytes are access net address;
Source address (SA) is also to be made of 8 bytes (byte), is defined identical as destination address (DA);
Reserve bytes are made of 2 bytes;
The part payload has different length according to the type of different datagrams, is if it is various protocol packages 64 bytes are 32+1024=1056 bytes if it is single group unicast packets words, are not restricted to above 2 kinds certainly;
CRC is made of 4 bytes, and calculation method follows the Ethernet CRC algorithm of standard.
2.2 Metropolitan Area Network (MAN) packet definitions
The topology of Metropolitan Area Network (MAN) is pattern, may there is 2 kinds, connection even of more than two kinds, i.e. node switching between two equipment It can all can exceed that 2 kinds between machine and node server, node switch and node switch, node switch and node server Connection.But the metropolitan area net address of metropolitan area network equipment is uniquely, to close to accurately describe the connection between metropolitan area network equipment System, introduces parameter in embodiments of the present invention: label, uniquely to describe a metropolitan area network equipment.
(Multi-Protocol Label Switch, multiprotocol label are handed over by the definition of label and MPLS in this specification Change) label definition it is similar, it is assumed that between equipment A and equipment B there are two connection, then data packet from equipment A to equipment B just There are 2 labels, data packet also there are 2 labels from equipment B to equipment A.Label is divided into label, outgoing label, it is assumed that data packet enters The label (entering label) of equipment A is 0x0000, and the label (outgoing label) when this data packet leaves equipment A may reform into 0x0001.The networking process of Metropolitan Area Network (MAN) is to enter network process under centralized control, also means that address distribution, the label of Metropolitan Area Network (MAN) Distribution be all to be dominated by metropolitan area server, node switch, node server be all passively execute, this point with The label distribution of MPLS is different, and the distribution of the label of MPLS is the result that interchanger, server are negotiated mutually.
As shown in the table, the data packet of Metropolitan Area Network (MAN) mainly includes following sections:
DA SA Reserved Label Payload CRC
That is destination address (DA), source address (SA), reserve bytes (Reserved), label, payload (PDU), CRC.Its In, the format of label, which can refer to, such as gives a definition: label is 32bit, wherein high 16bit retains, only with low 16bit, its position Set is between the reserve bytes and payload of data packet.
Based on the above-mentioned characteristic of view networking, one of the core concepts of the embodiments of the present invention is proposed, it then follows regard the association of networking View after receiving the log-on message that browser end is sent by streaming media server, sends key to browser end, while user logs in Timer is created by browser end after browser end, in preset duration, based on close between browser end and streaming media server Key carries out data interaction, when reaching preset duration, the key that please be look for novelty to streaming media server again from browser end, later Data interaction is carried out using new key between browser end and streaming media server, is improved long-range by tools such as browsers Configure safety when streaming media server operation.
When inventor has found existing to remotely accessing depending on streaming media server in networking and configuring operation, because logical Cross the encryption key when tools such as browser and streaming media server carry out data interaction be it is constant, such key is easy for It is maliciously cracked, is stolen so as to cause data.
Such as: after view on-line customer Li Si logs in streaming media server by the browser end on a view networked devices, Streaming media server sends a key to the browser end, and Li Si is carried out by the browser end and streaming media server later It is all based on the key when data interaction and implements encryption, it is assumed that Li Si carries out data friendship by the browser end and streaming media server Mutually it continue for 30 minutes, and the time that another malice possesses abundance depending on two pockmarks of on-line customer during this period carries out brokenly the key Solution, that is, rogue attacks success rate is carried out with streaming media server data interaction to the browser end and is greatly increased, to obtain Lee Four carry out all data when data interaction by the browser end and streaming media server, it might even be possible to obtain the whole of Li Si All information in information and streaming media server has seriously threatened the peace of Li Si's personal data and streaming media server data Entirely.
In view of the above-mentioned problems, inventor, by further investigation, creative proposing passes through browser end in user account Timer is created when logging in streaming media server and timing is carried out to user account log duration, when log duration reaches default The key more renewed when long, browser end carry out data interaction based on new key and streaming media server.The invention enables numbers Key when according to interaction can greatly improve the difficulty of breaking cryptographic keys, to achieve the purpose that anti-rogue attacks with dynamic mapping. Detailed explanation and illustration is carried out to the present invention program below.
Fig. 5 shows a kind of flow chart of the method for anti-rogue attacks of the embodiment of the present invention, and it is clear that this method is applied to first Look at device end, the first browser end is installed on the first view networked devices, and the method for anti-rogue attacks includes the following steps:
Step 101: determining that user account logs in the log duration of streaming media server by the first browser end.
In the embodiment of the present invention, user logs in streaming media server by the first browser end, with convection media server It accesses and configures, wherein the first browser end is installed on the first view networked devices, it is to be appreciated that the first view networking Equipment is depending on any equipment that can install browser end in networking, and be mounted on first is depending on the browser end on networked devices First browser end.Account is needed when user logs under normal circumstances, the account title and account number cipher of the account are only used Family itself knows, user must input the account title and close of itself first when logging in streaming media server by browser end Code, and account title and password correctly can just log on streaming media server.After logging in streaming media server, determine User account logs in the log duration of streaming media server by browser end.
Such as: view on-line customer Li Si needs to access and configure streaming media server, and Li Si passes through the first view networked devices On the first browser end log in streaming media server, wherein first view networked devices physical address are as follows: 30-5D-66-DC- 08-26;The account title of Li Si are as follows: Seiya, password are as follows: FreeSaint;Li Si inputs itself account on the first browser end Number, streaming media server verifying account title password is correct, and Li Si successfully logs in streaming media server, starts to step on Li Si at this time The log duration of record streaming media server is recorded.
Optionally, step 101 specifically includes:
Step 101a: when user account successfully logs in streaming media server by the first browser end, start timer The log duration for logging in streaming media server to user account carries out timing.
Step 101b: the duration of timer record is determined as the log duration that user account logs in streaming media server.
In the embodiment of the present invention, by browser end when user account successfully logs in streaming media server, a meter is created When device, the timer be used for user account log in streaming media server log duration carry out timing, when user account success When logging in streaming media server, timing is carried out by the log duration that the timer logs in streaming media server to user account, The duration of timer record is the log duration that user account logs in streaming media server.
Such as Streaming Media clothes are successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si When business device, the first browser end creates a timer, and the log duration for starting to log in Li Si streaming media server is counted When, it is assumed that it is 30 minutes when timer, then the log duration that Li Si logs in streaming media server is just 30 minutes.
Step 102: in the case where log duration reaches preset duration, sending dynamic key to streaming media server and ask It asks, dynamic key request is for streaming media server request dynamic key, dynamic key to be the first browser end and Streaming Media Server carries out the encryption key of view networking data interaction.
In the embodiment of the present invention, after user account successfully logs in streaming media server, its log duration is recorded, In the case where log duration reaches preset duration, the first browser end actively sends dynamic key to streaming media server and asks It asks, dynamic key request is for streaming media server request dynamic key, dynamic key to be the first browser end and stream matchmaker Body server carries out the encryption key of view networking data interaction.
It should be noted that streaming media server can be at once to after user account successfully logs in streaming media server One browser end sends a key, which is that streaming media server generates at random, has time-bounded key, in user In this period that the log duration that account successfully logs in streaming media server to user account arrives preset duration up to first time, stream Data interaction between media server and the first browser end is all based on the key, until the log duration of user account When reaching preset duration for the first time, the first browser end sends dynamic key request to streaming media server, which asks It asks for streaming media server request dynamic key.
Such as: Streaming Media clothes are successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si When business device, the first browser end creates a timer, and the log duration for starting to log in Li Si streaming media server is counted When, it is assumed that preset duration be 6 minutes, then Li Si log in streaming media server login after, streaming media server at once just to First browser end sends a key, within 0 minute~6 minute this period, the first browser end and streaming media server Between based on the key carry out data interaction.When the timing duration of timer reaches 6 minutes, the first browser end is actively to stream Media server sends dynamic key request.
Step 103: the dynamic key that receiving stream media server is sent.
It, can be random after streaming media server receives the transmission dynamic key request of the first browser end in the embodiment of the present invention Generate a dynamic key, this dynamic key has time-bounded, and validity period is more than or equal to preset duration.It is raw in dynamic key The dynamic key is sent to the first browser end by Cheng Hou, streaming media server, and it is close that the first browser end will receive the dynamic Key.
Step 104: interact depending on networking data with streaming media server based on dynamic key, and reset log duration.
In the embodiment of the present invention, after the dynamic key that the first browser end receives streaming media server transmission, at 0 point The encryption key that the first browser end carries out data interaction with streaming media server when clock~6 minute just ceases to be in force automatically.Later The encryption key that one browser end and streaming media server carry out data interaction just becomes the dynamic that streaming media server is newly sent Key, the first browser end can reset the log duration of user account at the same time, that is, user account when timer passes through The log duration that first browser end logs in streaming media server will be cleared, timer reclocking.
Such as: Streaming Media clothes are successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si It is engaged in after device, within 0 minute~6 minute this period, it is assumed that 1# key is based between the first browser end and streaming media server Carry out data interaction.When the first browser end receiving stream media server send 2# dynamic key after, the first browser end with Data interaction is carried out based on 2# dynamic key between streaming media server, while the timing duration of timer is reset, and is restarted Timing.That is, carrying out data interaction based on 2# dynamic key between the first browser end and streaming media server, together after 6 minutes When timer again since 0 to the log duration of user account timing.
Step 105: in the case that log duration after a reset reaches preset duration, being sent newly to streaming media server Dynamic key request, carries out view networking data with the new dynamic key and streaming media server that send based on streaming media server Interaction.
In the embodiment of the present invention, data are carried out based on 2# dynamic key between the first browser end and streaming media server Interaction, while the timing duration resetting of timer is reset after restarting timing, when the log duration of user account reaches again In the case where preset duration, the first browser end sends new dynamic key request, Streaming Media to streaming media server again It is random to generate 3# dynamic key after server receives the request, and it is sent to the first browser end;First browser end later Interact depending on networking data with streaming media server based on 3# dynamic key, while the timing duration of timer resets clearing again Restart timing.
From the above mentioned, and so on, as long as the log duration of user account reaches preset duration, the dynamic more renewed is close Key, the encryption key that whole process continues the data interaction between the first browser end of period and streaming media server do not stop to become Change, until user account is logged off, does not visit again and configure streaming media server.And preset duration can as desired certainly Row setting, if needing higher safety, better anti-rogue attacks, then preset duration is set it is shorter, although meeting The working efficiency of convection media server generates certain influence, but compared to the aspect of performance of safety and anti-rogue attacks ratio Compared with the influence can be ignored.
Such as: Streaming Media clothes are successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si It is engaged in after device, within 0 minute~6 minute this period, it is assumed that 1# key is based between the first browser end and streaming media server Carry out data interaction;When the first browser end receiving stream media server send 2# dynamic key after, the first browser end with Data interaction is carried out based on 2# dynamic key between streaming media server, while the timing duration of timer is reset, and is restarted Timing;Li Si logged in 6 minutes~12 minute this period of the first browser end, the log duration 6 of Li Si when timer Minute, data interaction is carried out based on 2# key between the first browser end and streaming media server, Li Si logs in the first browser When holding 12 minutes, the 3# dynamic key that the first browser end receiving stream media server is sent, while the timing duration of timer It resets again, data interaction is carried out based on 3# dynamic key between the first browser end and streaming media server, timer is opened again Beginning timing 6 minutes.
Assuming that malice view two pockmarks of on-line customer are thought after Li Si logs in streaming media server by the first browser end Malice steals the total data information of Li Si, it is necessary to crack progress data friendship between the first browser end and streaming media server Mutual encryption key, but breaking cryptographic keys need the time, it is assumed that two pockmarks need 6 minutes or more just can with breaking cryptographic keys, But the transformation in encryption key every 6 minutes that data interaction is carried out between the first browser end and streaming media server are primary, therefore Two pockmarks are impossible to crack the encryption key that data interaction is carried out between the first browser end and streaming media server, thus nothing Method successfully realizes rogue attacks, can not steal the data of Li Si and streaming media server.
Assuming that just need 6 minutes just can be with breaking cryptographic keys, between the first browser end and streaming media server for two pockmarks The transformation in encryption key every 6 minutes for carrying out data interaction are primary, and two pockmarks also can not successfully realize rogue attacks, because of two pockmarks Encryption key has just been cracked, the encryption key that data interaction is carried out between the first browser end and streaming media server just changes, Two pockmarks need to crack again, therefore two pockmarks are also impossible to crack and be counted between the first browser end and streaming media server According to interactive encryption key, so that rogue attacks can not be realized successfully, the data of Li Si and streaming media server can not be stolen.
Assuming that two pockmarks within 6 minutes can breaking cryptographic keys, carried out between the first browser end and streaming media server Transformation in the encryption key of data interaction every 6 minutes is primary, two pockmarks be possible to the first browser end and streaming media server it Between carry out cracking encryption key in 6 minutes of data interaction, two pockmarks start to steal data later, but its data stolen is very It is limited because variation in encryption key every 6 minutes is primary, after key conversion two pockmarks also need first to crack after transformation key just can be with Data are stolen again.And within duration needed for preset duration is shortened to two pockmarks breaking cryptographic keys, two fiber crops are just prevented completely Son steals a possibility that data so that two pockmarks can not successfully realize rogue attacks, ensure that Li Si personal data and The safety of streaming media server data.
Optionally, referring to Fig. 6, flow chart the step of when showing a kind of situation in the method for anti-rogue attacks, in reality It there is also another situation in the application of border, determining user account stepping on by the first browser end login streaming media server After recording duration, the method for anti-rogue attacks further include:
Step 201: it is logical to log in authorization requests characterization user account for the login authorization requests that receiving stream media server is sent It crosses the request of the second browser end and logs in streaming media server, the second browser end is installed on the second view networked devices.
In the embodiment of the present invention, it is understood that there may be such a case, due to factors such as original subscriber's account leakages, so that other Malice is aware of the title and password of original subscriber's account depending on on-line customer, then being stepped in original subscriber's account by the first browser end After recording streaming media server, which is stepped on using the title and password of original subscriber's account in the second browser end depending on on-line customer Streaming media server is recorded, wherein the second browser end is installed on the second view networked devices, view on-line customer uses original when malice For the title and password of user account when the second browser end logs in streaming media server, streaming media server receives the login When request, logged on streaming media server since original subscriber's account has passed through the first browser end, streaming media server is sentenced The physical address of the first view networked devices where disconnected first browser end is set with second where the second browser end depending on networking Standby physical address is different, therefore streaming media server can send to the first browser end and log in authorization requests, which awards Power request characterization original subscriber's account logs in streaming media server by the request of the second browser end.
Such as: Streaming Media clothes are successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si It is engaged in after device, data interaction, streaming media server meeting after Li Si logs in is carried out between the first browser end and streaming media server Record its account title: the physical address of the view networked devices of Seiya and first are as follows: 30-5D-66-DC-08-26.When malice view connection Two pockmarks of network users use the account title of Li Si: Seiya, password: when FreeSaint logs in streaming media server, Streaming Media Server judges that user's name is identical, is all Seiya, but the physical address of the second view networked devices are as follows: 34-8D-96-DC- 18-86, different from the first view physical address of networked devices, then streaming media server can send to the first browser end and log in The request is shown that on the front end display screen of the first view networked devices, Li Si can be with first by authorization requests, the first browser end Time is known.
Step 202: in the case where not allowing user account to log in by the second browser end, being sent out to streaming media server Dynamic key is sent to update request, dynamic key updates request and updates dynamic key for requesting to streaming media server.
Step 203: the updated dynamic key that receiving stream media server is sent, and it is based on updated dynamic key Interact depending on networking data with streaming media server.
In the embodiment of the present invention, after the login authorization requests that the first browser end receives streaming media server transmission, Original subscriber is known that other people have logged in streaming media server with the account of itself, when original subscriber is considered that account number reveals quilt When other people usurp, account number is not allowed for log in streaming media server by the second browser end, is taken at once to Streaming Media Business device sends dynamic key and updates request, and dynamic key, which updates, requests for requesting to update dynamic key to streaming media server, After streaming media server receives the request, dynamic key is updated immediately, and send updated dynamic to the first browser end Key, the first browser end are based on updated dynamic key and interact depending on networking data with streaming media server, while former User modifies the account number cipher of itself at once, is stolen and usurps again to prevent account.Streaming media server will not respond malice and regard On-line customer logs in the request of streaming media server using original subscriber's account by the second browser end, and to the second browser end End sends refusal log-on message, and malice can not just log in streaming media server depending on on-line customer.
If it is who is logging in streaming media server with the account of itself that original subscriber, which knows, account number is allowed to pass through second In the case that browser end logs in, the first browser end sends dynamic key forwarding instruction, dynamic key to streaming media server Forwarding instruction is used to indicate streaming media server and sends dynamic key to the second browser end, so that the second browser end is based on being somebody's turn to do Dynamic key interact depending on networking data with streaming media server, i.e., original subscriber's account logs in stream matchmaker by the second browser end The success of body server, original subscriber's account is automatically offline in the first browser end at this time.
Assuming that being that malice passes through the first browser end login streaming media server depending on on-line customer in advance, and has modified former use The password of family account, then will show and step on when later period original subscriber's account logs in streaming media server by the second browser end Password mistake is recorded, original subscriber's account knows that itself password is revealed naturally, immediately passes through the reconditioning of password retrieval function and modifies itself account Number password, original subscriber's account re-starts login with modified password later.
Assuming that being that malice passes through the first browser end login streaming media server depending on on-line customer in advance, but no modification is former The password of user account, if that original subscriber's account logs in Streaming Media clothes by the first browser end or the second browser end The time of business device does not log in streaming media server by the first browser end depending on on-line customer with malice and conflicts, then original subscriber's account When number logging in streaming media server success by the first browser end or the second browser end, streaming media server can Xiang Yuanyong The browser end that family account uses sends original subscriber's account and carried out the information logged at what time, and original subscriber can be according to this Information judges whether account number is leaked and steals that original subscriber's account can immediately pass through password retrieval function reconditioning modification itself Account number cipher, original subscriber's account re-starts login with modified password later.
Assuming that being that malice passes through the first browser end login streaming media server depending on on-line customer in advance, but no modification is former The password of user account, if that original subscriber's account logs in time and the malice of streaming media server by the second browser end Streaming media server conflict is logged in by the first browser end depending on on-line customer, that is, original subscriber's account passes through the second browser end When logging in streaming media server, malice is passing through the first browser end depending on on-line customer and streaming media server carries out data friendship Mutually, then malice is depending on on-line customer can receive the login authorization requests of streaming media server transmission by the first browser end, At this time if malice does not allow original subscriber's account to log in streaming media server, Streaming Media by the second browser end depending on on-line customer Server is not responding to the request that original subscriber's account logs in streaming media server by the second browser end naturally, and browses to second Device end end sends refusal log-on message, and original subscriber will know that account number is stolen;If malice view on-line customer allows former User account logs in streaming media server by the second browser end, moves then streaming media server is sent to the second browser end Original subscriber's account is also sent while state key and carried out the information logged at what time, and original subscriber's account passes through the second browsing Device end logs in streaming media server success, but original subscriber is known that the account of itself carried out login at what time, from So it is known that account number is stolen.
Such as: Streaming Media clothes are successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si It is engaged in after device, data interaction, streaming media server meeting after Li Si logs in is carried out between the first browser end and streaming media server Record its account title: the physical address of the view networked devices of Seiya and first are as follows: 30-5D-66-DC-08-26.When malice view connection Two pockmarks of network users use the account title of Li Si: Seiya, password: when FreeSaint logs in streaming media server, Streaming Media Server judges that user's name is identical, is all Seiya, but the physical address of the second view networked devices are as follows: 34-8D-96-DC- 18-86, different from the first view physical address of networked devices, then streaming media server can send to the first browser end and log in The request is shown that on the front end display screen of the first view networked devices, Li Si can be with first by authorization requests, the first browser end Time is known.
Assuming that Li Si is considered that account number leakage is usurped by other people, account number is not allowed to pass through the second browser end Streaming media server is logged in, dynamic key is sent to streaming media server at once and updates request, streaming media server receives this After request, dynamic key is updated immediately, and send updated dynamic key to the first browser end, the first browser end is based on Updated dynamic key interact depending on networking data with streaming media server, at the same Li Si modify at once itself account it is close Code, is stolen again to prevent account and usurps.Streaming media server will not respond two pockmarks of user using the account of Li Si by the Two browser ends log in the request of streaming media server, and send refusal log-on message, two fiber crops of user to the second browser end end Son can not just log in streaming media server.
Assuming that it is who is logging in streaming media server with the account of itself that Li Si, which knows, account number is allowed to pass through second In the case that browser end logs in, the first browser end sends dynamic key forwarding instruction to streaming media server, later Li Si Account by the second browser end log in streaming media server success, the account of Li Si is in the case where the first browser end is automatic at this time Line.
Assuming that being maliciously to pass through the first browser end in advance depending on two pockmarks of on-line customer to log in streaming media server, and modify The password of the account of Li Si, then will show and step on when later period Li Si logs in streaming media server by the second browser end Password mistake is recorded, Li Si knows that itself password is revealed naturally, password retrieval function reconditioning modification account number password is immediately passed through, Li Si re-starts login with modified password later.
Assuming that being maliciously to pass through the first browser end in advance depending on two pockmarks of on-line customer to log in streaming media server, but do not have The password of the account of Li Si is modified, if that the account of Li Si logs in stream by the first browser end or the second browser end The time of media server does not log in streaming media server by the first browser end with two pockmarks and conflicts, then the account of Li Si When logging in streaming media server success by the first browser end or the second browser end, streaming media server can be to Li Si The account that the browser end that account uses sends Li Si carried out the information logged at what time, and Li Si can be according to the information Judging whether account number is leaked to steal, Li Si can immediately pass through password retrieval function reconditioning modification account number password, Li Si re-starts login with modified password later.
Assuming that being maliciously to pass through the first browser end in advance depending on two pockmarks of on-line customer to log in streaming media server, but do not have The password of the account of Li Si is modified, if that the account of Li Si logs in the time of streaming media server by the second browser end It logs in streaming media server by the first browser end with two pockmarks to conflict, that is, the account of Li Si is stepped on by the second browser end When recording streaming media server, two pockmarks are passing through the first browser end and streaming media server carries out data interaction, then two Pockmarks can receive the login authorization requests of streaming media server transmission by the first browser end, at this time if two pockmarks do not permit Perhaps the account of Li Si logs in streaming media server by the second browser end, and streaming media server is not responding to the account of Li Si naturally The request of streaming media server is logged in by the second browser end, and sends refusal log-on message, Lee to the second browser end end Four will know that account number is stolen;It is taken if two pockmarks allow original subscriber's account to log in Streaming Media by the second browser end Business device, then what when streaming media server also sends the account of Li Si in while sending dynamic key to the second browser end Between carried out the information logged in, Li Si logs in streaming media server success by the second browser end, but Li Si is known that The account of itself carried out login at what time, was known that account number is stolen naturally.
In conclusion the solution of the present invention both ensure that the safety of user's data and streaming media server data, It also ensures that user has found that account number leakage is stolen in time, so as to time update account number cipher, equally improves safety.
Referring to Fig. 7, the flow chart of the method for another anti-rogue attacks of the embodiment of the present invention is shown, this method is applied to The method of streaming media server, anti-rogue attacks includes:
Step 301: receiving the dynamic key request that the first browser end is sent, dynamic key request is logical in user account Cross the first browser end log in streaming media server log duration reach preset duration in the case where, by the first browser end send out The request sent, the first browser end are installed on the first view networked devices.
Step 302: being requested according to dynamic key, send dynamic key to the first browser end.
Step 303: interact depending on networking data with the first browser end based on dynamic key.
Step 304: receive the new dynamic key request that the first browser end is sent, new dynamic key request for The log duration that family account logs in after the log duration resetting of streaming media server by the first browser end reaches preset duration In the case where, by the request of the first browser end transmission.
Step 305: being requested according to new dynamic key, new dynamic key is sent to the first browser end.
Step 306: interact depending on networking data with the first browser end based on new dynamic key.
In the embodiment of the present invention, step 601~step 606 sends for streaming media server according to the first browser end each A request, in response to the method for each request, to reach the method for realizing anti-rogue attacks with the first browser end collective effect The step of, it comprises the concrete steps that:
Streaming media server after user account logins successfully, send out by the first browser end that can actively use to user account A key is sent, data interaction is carried out based on the key and the first browser end later, is reached in the log duration of user account When preset duration, streaming media server can receive the dynamic key request of the first browser end transmission, streaming media server root It is requested according to dynamic key, sends dynamic key to the first browser end, carried out later based on dynamic key and the first browser end Depending on networking data interaction.
When the log duration of user account reaches preset duration again, streaming media server receives the first browser end The new dynamic key request sent, streaming media server are requested according to new dynamic key, are sent to the first browser end new Dynamic key, interact depending on networking data with the first browser end based on new dynamic key later.
Likewise, when there is the case where malice view on-line customer logs in streaming media server using original subscriber's account, stream Media server passes through the logging request of the second browser end transmission receiving original subscriber's account, judges that account title is identical, Corresponding login authorization requests just are sent to the first browser end, if original subscriber refuses original subscriber's account and passes through the second browser End logs in streaming media server, then the dynamic key that streaming media server receives that the first browser end is sent updates request, response It updates and requests in dynamic key, send updated dynamic key to the first browser end, and refuse to the transmission of the second browser end Exhausted log-on message interact depending on networking data with the first browser end based on updated dynamic key later.
And after streaming media server sends corresponding login authorization requests to the first browser end, streaming media server The dynamic key forwarding instruction of the first browser end transmission is received, streaming media server is forwarded in response to dynamic key and is instructed, Dynamic key is sent to the second browser end, interact depending on networking data with the second browser end based on the dynamic key.
In addition, streaming media server itself may include timer, it is close based on one after user account logins successfully Key interact depending on networking data with browser end, and starts own timer and step on to user account login streaming media server Record duration carries out timing and does not receive clear in the case where the timing of streaming media server timer reaches default timing duration The new dynamic key that device end is sent of looking at is requested, it is believed that browser end breaks down, and streaming media server is actively to browser end Send new dynamic key, the timer of certain streaming media server it is pre-designed constantly it is long be greater than browser end it is default when It is long.
If receiving browsing in the case where the timing of the timer of streaming media server not up to default timing duration The new dynamic key request that device end is sent, it is believed that browser end works normally, and streaming media server resets own timer pair User account logs in the timing duration of the log duration of streaming media server.
Using this dual dynamic key salvo, the reliability of the present invention program is more improved, is perfectly reached The purposes of anti-rogue attacks.
As shown in figure 8, showing the schematic diagram of the system of the anti-rogue attacks of the embodiment of the present invention, which includes the first view Networked devices, the first browser end being mounted thereon;Second depending on networked devices, the second browser end being mounted thereon and Streaming media server, it is assumed that preset duration is 3 minutes.
Streaming media server is successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si Afterwards, streaming media server sends 1# key to the first browser end at the first time, the first browser end and streaming media server it Between data interaction carried out based on 1# key, while streaming media server will record its account title after Li Si logs in: Seiya and The physical address of first view networked devices: 30-5D-66-DC-08-26, and the login that Li Si is logged in using the timer of itself Duration carries out timing, and the preset duration of the timer of streaming media server is 4 minutes.Streaming media server is successfully logged in Li Si After success, the first browser end creates a timer and starts to count the log duration of Li Si's login streaming media server When, when the log duration of the Li Si in timer reaches 3 minutes, the first browser end sends dynamic to streaming media server Key request, streaming media server respond the request and generate 2# key at random, and the validity period of 2# key is more than or equal to the first browsing The duration of the timer of device end creation, and the timing duration of own timer is reset simultaneously.The first browser end is based on 2# later Key and streaming media server carry out data interaction.Such every 3 minutes one secondary keys of replacement are repeated up to Li Si and exit and step on Record streaming media server.
Assuming that in the above process, there is mistake or failure in the first browser end, there is no according to every 3 minutes to Streaming Media The dynamic key request that server is sent, then when the log duration of Li Si reaches 4 minutes, streaming media server is actively to the One browser end sends dynamic key, and such double shield mechanism more ensure that the safety of data, anti-rogue attacks Ability is stronger.
When malice view two pockmarks of on-line customer use the account title of Li Si: Seiya, password: FreeSaint passes through second Browser end request logs in streaming media server, and Li Si is passing through the first browser end and logs in streaming media server at this time On, it is all Seiya that streaming media server judges user's name is identical, but the physical address of the second view networked devices are as follows: 34- 8D-96-DC-18-86, different from the first view physical address of networked devices, then streaming media server can be to the first browser End, which is sent, logs in authorization requests, and the first browser end shows the request on the front end display screen of the first view networked devices, Lee Four know that account number leakage is stolen.
Li Si does not allow account number to log in streaming media server by the second browser end, at once to streaming media server It sends dynamic key and updates request, while modifying the password of account number at once, streaming media server receives dynamic key more After new request, dynamic key is updated immediately, and send updated dynamic key, the first browser end group to the first browser end Interact depending on networking data with streaming media server in updated dynamic key.Streaming media server will not respond user two Pockmarks log in the request of streaming media server using the account of Li Si by the second browser end, and send out to the second browser end end Send refusal log-on message, two pockmarks of user can not just log in streaming media server, and because Li Si has modified account number cipher, and two The account number cipher that pockmarks must steal Li Si again can just reuse the account of Li Si.
If Fig. 9 shows a kind of block diagram of the device of anti-rogue attacks of the embodiment of the present invention, it is clear which is applied to first Look at device end, the first browser end is installed on the first view networked devices, and the device of anti-rogue attacks includes:
Duration module 410 is determined, for determining that user account logs in stepping on for streaming media server by the first browser end Record duration;
Dynamic key request module 420 is sent, for being taken to Streaming Media in the case where log duration reaches preset duration Device of being engaged in sends dynamic key request, and dynamic key request is for streaming media server request dynamic key, dynamic key the One browser end carries out the encryption key interacted depending on networking data with streaming media server;
Dynamic key module 430 is received, the dynamic key sent for receiving stream media server;
Interaction resetting module 440 is laid equal stress on for interact depending on networking data with streaming media server based on dynamic key Set log duration;
New key interactive module 450, in the case where reaching preset duration for log duration after a reset, to Streaming Media Server sends new dynamic key request, with the new dynamic key and streaming media server sent based on streaming media server Carry out view networking data interaction.
Optionally it is determined that duration module includes:
Start timer submodule, for successfully logging in streaming media server by the first browser end in user account When, the log duration that starting timer logs in streaming media server to user account carries out timing;
It determines duration submodule, logs in streaming media server for the duration of timer record to be determined as user account Log duration.
Optionally, the device of anti-rogue attacks further include:
Authorization request module is received, for the login authorization requests that receiving stream media server is sent, logs in authorization requests It characterizes user account and streaming media server is logged in by the request of the second browser end, the second browser end is installed on the networking of the second view In equipment;
Send update cipher key module, for do not allow user account by the second browser end log in the case where, to Streaming media server sends dynamic key and updates request, and it is dynamic for updating to streaming media server request that dynamic key updates request State key;
Cipher key interaction module is updated, for the updated dynamic key that receiving stream media server is sent, and based on more Dynamic key after new interact depending on networking data with streaming media server.
Optionally, the device of anti-rogue attacks further include:
Instruction module is forwarded, is used in the case where allowing user account to log in by the second browser end, to Streaming Media Server sends dynamic key forwarding instruction, and dynamic key forwarding instruction is used to indicate streaming media server to the second browser end Dynamic key is sent, so that the second browser end is based on the dynamic key and interact depending on networking data with streaming media server.
If Figure 10 shows the block diagram of the device of another anti-rogue attacks of the embodiment of the present invention, which is applied to stream matchmaker The device of body server, another anti-rogue attacks includes:
First end request module 510 is received, for receiving the dynamic key request of the first browser end transmission, dynamic key Request is the case where user account reaches preset duration by the log duration that the first browser end logs in streaming media server Under, the request sent by the first browser end, the first browser end is installed on the first view networked devices;
First end cipher key module 520 is sent, for requesting according to dynamic key, it is close to send dynamic to the first browser end Key;
Data interaction module 530, for interact depending on networking data with the first browser end based on dynamic key;
Cipher key module 540 after resetting is received, for receiving the new dynamic key request of the first browser end transmission, newly Dynamic key request is stepping on after user account logs in the log duration resetting of streaming media server by the first browser end In the case that record duration reaches preset duration, by the request of the first browser end transmission;
New key module 550 is sent, for sending new dynamic to the first browser end according to new dynamic key request Key;
First end interactive module 560 is handed over for carrying out view networking data based on new dynamic key and the first browser end Mutually.
Optionally, the device of another anti-rogue attacks further include:
Receive second end request module, for receive user account pass through the second browser end send logging request When, corresponding login authorization requests are sent to the first browser end, the second browser end is installed on the second view networked devices;
First end update module is received, the dynamic key for receiving the transmission of the first browser end updates request, and dynamic is close It is in the case where not allowing user account to log in by the second browser end, more to streaming media server request that key, which updates request, The request of new dynamic key;
Response sends update module, requests for updating in response to dynamic key, is sent after updating to the first browser end Dynamic key;
Interactive module after update is handed over for carrying out view networking data based on updated dynamic key and the first browser end Mutually.
Optionally, the device of another anti-rogue attacks further include:
First end forwarding module is received, for receiving the dynamic key forwarding instruction of the first browser end transmission, dynamic is close Key forwarding instructs in the case where allowing user account to log in by the second browser end, to indicate streaming media server to second The instruction of browser end transmission dynamic key;
Response sends cipher key interaction module, instructs for forwarding in response to dynamic key, sends to the second browser end dynamic State key, so that streaming media server is based on the dynamic key and interact depending on networking data with the second browser end.
Through the foregoing embodiment, a kind of method and apparatus of anti-rogue attacks of the present invention, pass through browser in user account End records its log duration while login, in the case where log duration reaches preset duration, by the first browser It holds to streaming media server and sends dynamic key request, and view networking data is carried out based on dynamic key and streaming media server and is handed over Mutually, browser end resets log duration simultaneously, in the case that log duration after a reset reaches preset duration again, to stream matchmaker Body server sends new dynamic key request, is handed over carrying out view networking data based on new dynamic key and streaming media server Mutually.And after user account leakage steals use by malicious user, malicious user can be prevented to steal user account data With the data of streaming media server.Using the present invention program, data interaction is carried out between browser end and streaming media server When key be dynamic change, that is, when the every arrival preset duration of user account log duration, all replace a key so that The user for wanting rogue attacks does not have time enough breaking cryptographic keys, greatly improves the difficulty of other malicious user breaking cryptographic keys Degree, to achieve the purpose that anti-rogue attacks.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can provide as method, apparatus or calculate Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
The embodiment of the present invention be referring to according to the method for the embodiment of the present invention, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart And/or in one or more blocks of the block diagram specify function the step of.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, herein, the terms "include", "comprise" or its it is any its He is intended to non-exclusive inclusion by variant, so that process, method, article or device including a series of elements are not Only include those elements, but also including other elements that are not explicitly listed, or further include for this process, method, Article or the intrinsic element of device.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the device for including the element.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (11)

1. a kind of method of anti-rogue attacks, which is characterized in that the method is applied to the first browser end, first browsing Device end is installed on the first view networked devices, which comprises
Determine that user account logs in the log duration of streaming media server by first browser end;
In the case where the log duration reaches preset duration, Xiang Suoshu streaming media server sends dynamic key request, institute Dynamic key request is stated for the streaming media server request dynamic key, the dynamic key to be first browser End carries out the encryption key interacted depending on networking data with the streaming media server;
Receive the dynamic key that the streaming media server is sent;
Interact depending on networking data with the streaming media server based on the dynamic key, and resets the log duration;
In the case that log duration after a reset reaches the preset duration, Xiang Suoshu streaming media server sends new dynamic Key request carries out view networking with the new dynamic key and the streaming media server that send based on the streaming media server Data interaction.
2. the method according to claim 1, wherein determining that user account is logged in by first browser end The log duration of streaming media server, comprising:
When the user account successfully logs in the streaming media server by first browser end, start timer pair The log duration that the user account logs in the streaming media server carries out timing;
The duration of the timer record is determined as the log duration that the user account logs in the streaming media server.
3. the method according to claim 1, wherein determining that user account stepped on by first browser end After the log duration for recording streaming media server, the method also includes:
The login authorization requests that the streaming media server is sent are received, it is logical that the login authorization requests characterize the user account It crosses the request of the second browser end and logs in the streaming media server, second browser end is installed on the second view networked devices On;
In the case where not allowing the user account to log in by second browser end, Xiang Suoshu streaming media server hair Dynamic key is sent to update request, it is close for updating dynamic to streaming media server request that the dynamic key updates request Key;
The updated dynamic key that the streaming media server is sent is received, and is based on the updated dynamic key and institute It states streaming media server and carries out view networking data interaction.
4. according to the method described in claim 3, it is characterized in that, in the login authorization for receiving the streaming media server transmission After request, the method also includes:
In the case where allowing the user account to log in by second browser end, Xiang Suoshu streaming media server is sent Dynamic key forwarding instruction, the dynamic key forwarding instruction are used to indicate the streaming media server to second browser End sends dynamic key, so that second browser end is based on the dynamic key and the streaming media server carries out view networking Data interaction.
5. a kind of method of anti-rogue attacks, which is characterized in that the method is applied to streaming media server, the method packet It includes:
Receive the dynamic key request of the first browser end transmission, dynamic key request is passes through described the in user account In the case that the log duration that one browser end logs in the streaming media server reaches preset duration, by first browser The request sent is held, first browser end is installed on the first view networked devices;
It is requested according to the dynamic key, the first browser end of Xiang Suoshu sends the dynamic key;
Interact depending on networking data with first browser end based on the dynamic key;
The new dynamic key request that first browser end is sent is received, the new dynamic key is requested as in institute State the log duration after user account is reset by the log duration that first browser end logs in the streaming media server In the case where reaching the preset duration, by the request of first browser end transmission;
According to the new dynamic key request, the first browser end of Xiang Suoshu sends the new dynamic key;
Interact depending on networking data with first browser end based on the new dynamic key.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
When receiving the logging request that user account is sent by the second browser end, the first browser end of Xiang Suoshu sends phase The login authorization requests answered, second browser end are installed on the second view networked devices;
It receives the dynamic key that first browser end is sent and updates request, the dynamic key updates request not allow In the case that the user account is logged in by second browser end, it is close that the request of Xiang Suoshu streaming media server updates dynamic The request of key;
It updates and requests in response to the dynamic key, the first browser end of Xiang Suoshu sends the updated dynamic key;
Interact depending on networking data with first browser end based on the updated dynamic key.
7. according to the method described in claim 6, it is characterized in that, being awarded sending corresponding log in first browser end After power request, the method also includes:
The dynamic key forwarding instruction that first browser end is sent is received, the dynamic key forwarding instructs allowing institute In the case where user account is stated by second browser end login, indicate the streaming media server to second browsing The instruction of device end transmission dynamic key;
It forwards and instructs in response to the dynamic key, the second browser end of Xiang Suoshu sends dynamic key, so that the Streaming Media Server is based on the dynamic key and interact depending on networking data with second browser end.
8. a kind of device of anti-rogue attacks, which is characterized in that described device is applied to the first browser end, first browsing Device end is installed on the first view networked devices, and described device includes:
Duration module is determined, when for determining login of the user account by first browser end login streaming media server It is long;
Send dynamic key request module, in the case where the log duration reaches preset duration, Xiang Suoshu Streaming Media Server sends dynamic key request, and dynamic key request is for the streaming media server request dynamic key, institute It states dynamic key and carries out the encryption key interacted depending on networking data with the streaming media server for first browser end;
Dynamic key module is received, the dynamic key sent for receiving the streaming media server;
Interaction resetting module, for interact depending on networking data with the streaming media server based on the dynamic key, and Reset the log duration;
New key interactive module, in the case where reaching the preset duration for log duration after a reset, to the stream matchmaker Body server sends new dynamic key request, with the new dynamic key and the stream sent based on the streaming media server Media server carries out view networking data interaction.
9. a kind of device of anti-rogue attacks, which is characterized in that described device is applied to streaming media server, described device packet It includes:
First end request module is received, for receiving the dynamic key request of the first browser end transmission, the dynamic key is asked It asks to reach preset duration by the log duration that first browser end logs in the streaming media server in user account In the case where, the request sent by first browser end, first browser end is installed on the first view networked devices;
First end cipher key module is sent, for requesting according to the dynamic key, the first browser end of Xiang Suoshu sends described dynamic State key;
Data interaction module, for interact depending on networking data with first browser end based on the dynamic key;
Cipher key module after resetting is received, the new dynamic key request sent for receiving first browser end, institute New dynamic key request is stated to log in the streaming media server by first browser end in the user account In the case that log duration after log duration resetting reaches the preset duration, asked by what first browser end was sent It asks;
New key module is sent, for requesting according to the new dynamic key, the first browser end of Xiang Suoshu sends described new Dynamic key;
First end interactive module is handed over for carrying out view networking data based on the new dynamic key and first browser end Mutually.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The step in method as claimed in claim 1 is realized when execution.
11. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor Machine program, which is characterized in that the step of processor realizes method as claimed in claim 1 when executing.
CN201910512044.5A 2019-06-13 2019-06-13 Method and device for preventing illegal attack, electronic equipment and storage medium Active CN110381021B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910512044.5A CN110381021B (en) 2019-06-13 2019-06-13 Method and device for preventing illegal attack, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910512044.5A CN110381021B (en) 2019-06-13 2019-06-13 Method and device for preventing illegal attack, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110381021A true CN110381021A (en) 2019-10-25
CN110381021B CN110381021B (en) 2021-04-20

Family

ID=68250283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910512044.5A Active CN110381021B (en) 2019-06-13 2019-06-13 Method and device for preventing illegal attack, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110381021B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702725A (en) * 2009-11-12 2010-05-05 清华大学 System, method and device for transmitting streaming media data
US8429081B1 (en) * 2004-02-12 2013-04-23 Novell, Inc. Techniques for securely delivering media data
CN106161383A (en) * 2015-04-15 2016-11-23 北京视联动力国际信息技术有限公司 A kind of multimedia data encryption, the method and device of deciphering
CN106850699A (en) * 2017-04-10 2017-06-13 中国工商银行股份有限公司 A kind of mobile terminal login authentication method and system
CN109743170A (en) * 2018-11-30 2019-05-10 视联动力信息技术股份有限公司 A kind of Streaming Media logs in and the method and apparatus of data transmission encryption

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8429081B1 (en) * 2004-02-12 2013-04-23 Novell, Inc. Techniques for securely delivering media data
CN101702725A (en) * 2009-11-12 2010-05-05 清华大学 System, method and device for transmitting streaming media data
CN106161383A (en) * 2015-04-15 2016-11-23 北京视联动力国际信息技术有限公司 A kind of multimedia data encryption, the method and device of deciphering
CN106850699A (en) * 2017-04-10 2017-06-13 中国工商银行股份有限公司 A kind of mobile terminal login authentication method and system
CN109743170A (en) * 2018-11-30 2019-05-10 视联动力信息技术股份有限公司 A kind of Streaming Media logs in and the method and apparatus of data transmission encryption

Also Published As

Publication number Publication date
CN110381021B (en) 2021-04-20

Similar Documents

Publication Publication Date Title
CN108023910B (en) A kind of terminal monitoring method and system based on view networking
CN108075920B (en) A kind of management method and system regarding networked terminals
CN108965912B (en) A kind of method, client and the server of video data processing
CN109120946A (en) The method and apparatus for watching live streaming
CN108023858B (en) A kind of view networking network management safety certifying method and its system
CN108881361A (en) A kind of data push method and device based on view networking
CN110062195A (en) A kind of video conference cut-in method and system
CN110138725A (en) A kind of method for interchanging data and security gateway
CN109787873A (en) A kind of method and apparatus of multi-to-multi incoming communication
CN109462594A (en) A kind of data processing method and system based on view networking
CN109194915A (en) A kind of processing method and system of video data
CN110324678A (en) Method, apparatus, electronic equipment and the readable storage medium storing program for executing of transmitting, monitoring resource
CN109905627A (en) A kind of method and apparatus of audio/video flow data recording
CN109151519A (en) A kind of configuration distribution method and system based on view networking
CN110536178A (en) A kind of live-broadcast control method and system
CN108989850A (en) A kind of video playing control method and control system
CN108881791B (en) A kind of conference control method and Conference control device based on view networking
CN110012063A (en) A kind of processing method and system of data packet
CN110445759A (en) A kind of electronic whiteboard sharing method and device
CN109376507A (en) A kind of data safety control method and system
CN110278244A (en) A kind of method of network entry and view networked terminals based on view networking
CN109586851A (en) Data transmission method and device based on view networking
CN109640194A (en) A kind of method and apparatus that terminal authorization is obtained by two dimensional code based on view networking
CN110392289A (en) A kind of processing method and system of account
CN109361546A (en) A kind of program method for early warning and device based on view networking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant