CN110381021A - A kind of method, apparatus, electronic equipment and the storage medium of anti-rogue attacks - Google Patents
A kind of method, apparatus, electronic equipment and the storage medium of anti-rogue attacks Download PDFInfo
- Publication number
- CN110381021A CN110381021A CN201910512044.5A CN201910512044A CN110381021A CN 110381021 A CN110381021 A CN 110381021A CN 201910512044 A CN201910512044 A CN 201910512044A CN 110381021 A CN110381021 A CN 110381021A
- Authority
- CN
- China
- Prior art keywords
- media server
- streaming media
- browser end
- dynamic key
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/068—Network architectures or network communication protocols for network security for supporting key management in a packet data network using time-dependent keys, e.g. periodically changing keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/40—Support for services or applications
Abstract
The present invention provides method, apparatus, electronic equipment and the storage mediums of a kind of anti-rogue attacks.The described method includes: determining that user account logs in the log duration of streaming media server by the first browser end, in the case where log duration reaches preset duration, dynamic key request is sent to streaming media server, interact depending on networking data with streaming media server based on dynamic key, and reset log duration, in the case that log duration after a reset reaches preset duration, new dynamic key request is sent, to streaming media server interact depending on networking data with streaming media server based on the new dynamic key that streaming media server is sent.Using the present invention program, key when carrying out data interaction between browser end and streaming media server is dynamic change, so that the difficulty for wanting user's breaking cryptographic keys of rogue attacks improves, a possibility that key is cracked is reduced, to achieve the purpose that anti-rogue attacks.
Description
Technical field
The present invention relates to field of communication technology more particularly to a kind of method, apparatus of anti-rogue attacks, electronic equipment and deposit
Storage media.
Background technique
It is a real-time exchange platform depending on networking, is the more advanced form of internet, depending on networks numerous Internet applications
Push HD video to, unitize, high definition is face-to-face.It will finally realize that the world without distance, realizes person to person in global range
Distance apart from an only screen;On the other hand, have flexible, the simple and low price of packet switch depending on networking, be provided simultaneously with
The quality and safety assurance of circuit switching, realize the whole network switched virtual circuit and data for the first time on communication history
The seamless connection of format.
Streaming media server: abbreviation Streaming Media, major function are to transmission audio, video and multimedia file in network
Media content is acquired, caches, dispatches and transmits broadcasting, full-featured and powerful, can be used as view intranet network and mutually
Intranet network carries out the server of data interaction, is widely used in view networking and internet.
Substantially it is divided to two kinds by the method for accessing depending on intranet network and configuring streaming media server at present, one is directly exist
Various access and configuration operation are carried out on streaming media server;Another kind is remotely accessed and is matched by tools such as browsers
Set operation.But safety when by the remote access of the tools such as browser and configuration operation is relatively low, it is easy to by success attack,
Leaking data is caused, the data safety of operation user and streaming media server is seriously threatened.
Summary of the invention
Method, apparatus, electronic equipment and the storage medium of a kind of anti-rogue attacks provided by the invention, greatly improve
The safety of user data and streaming media server data when remote access and configuration streaming media server operation.
In order to solve the above-mentioned technical problem, the embodiment of the invention provides a kind of method of anti-rogue attacks, the methods
Applied to the first browser end, first browser end is installed on the first view networked devices, which comprises
Determine that user account logs in the log duration of streaming media server by first browser end;
In the case where the log duration reaches preset duration, Xiang Suoshu streaming media server sends dynamic key and asks
It asks, the dynamic key request is for the streaming media server request dynamic key, the dynamic key to be described first
Browser end carries out the encryption key interacted depending on networking data with the streaming media server;
Receive the dynamic key that the streaming media server is sent;
When interact depending on networking data with the streaming media server based on the dynamic key, and resetting the login
It is long;
In the case that log duration after a reset reaches the preset duration, Xiang Suoshu streaming media server sends new
Dynamic key request, is regarded with the new dynamic key and the streaming media server that are sent based on the streaming media server
Networking data interaction.
Optionally it is determined that user account logs in the log duration of streaming media server, packet by first browser end
It includes:
When the user account successfully logs in the streaming media server by first browser end, start timing
The log duration that device logs in the streaming media server to the user account carries out timing;
When the duration of the timer record being determined as the user account logging in the login of the streaming media server
It is long.
Optionally, determine user account by first browser end log in streaming media server log duration it
Afterwards, the method also includes:
The login authorization requests that the streaming media server is sent are received, the login authorization requests characterize user's account
Number the streaming media server is logged in by the request of the second browser end, second browser end is installed on second and sets depending on networking
It is standby upper;
In the case where not allowing the user account to log in by second browser end, Xiang Suoshu streaming media service
Device sends dynamic key and updates request, and the dynamic key updates request and updates dynamic for requesting to the streaming media server
Key;
The updated dynamic key that the streaming media server is sent is received, and is based on the updated dynamic key
Interact depending on networking data with the streaming media server.
Optionally, after receiving the login authorization requests that the streaming media server is sent, the method also includes:
In the case where allowing the user account to log in by second browser end, Xiang Suoshu streaming media server
Dynamic key forwarding instruction is sent, it is clear to described second that the dynamic key forwarding instruction is used to indicate the streaming media server
Look at device end send dynamic key so that second browser end be based on the dynamic key regarded with the streaming media server
Networking data interaction.
The embodiment of the invention also provides the method for another anti-rogue attacks, the method is applied to streaming media service
Device, which comprises
The dynamic key request of the first browser end transmission is received, the dynamic key request is passes through institute in user account
State the first browser end log in the streaming media server log duration reach preset duration in the case where, it is clear by described first
Look at the request of device end transmission, first browser end is installed on the first view networked devices;
It is requested according to the dynamic key, the first browser end of Xiang Suoshu sends the dynamic key;
Interact depending on networking data with first browser end based on the dynamic key;
The new dynamic key request that first browser end is sent is received, the new dynamic key request is
Login after the user account logs in the log duration resetting of the streaming media server by first browser end
In the case that duration reaches the preset duration, by the request of first browser end transmission;
According to the new dynamic key request, the first browser end of Xiang Suoshu sends the new dynamic key;
Interact depending on networking data with first browser end based on the new dynamic key.
Optionally, the method also includes:
When receiving the logging request that user account is sent by the second browser end, the first browser end of Xiang Suoshu hair
Corresponding login authorization requests are sent, second browser end is installed on the second view networked devices;
It receives the dynamic key that first browser end is sent and updates request, the dynamic key updates request for not
In the case where allowing the user account to log in by second browser end, the request of Xiang Suoshu streaming media server updates dynamic
The request of state key;
It updates and requests in response to the dynamic key, it is close that the first browser end of Xiang Suoshu sends the updated dynamic
Key;
Interact depending on networking data with first browser end based on the updated dynamic key.
Optionally, after sending corresponding login authorization requests to first browser end, the method also includes:
The dynamic key forwarding instruction that first browser end is sent is received, the dynamic key forwarding instructs permitting
In the case that the described user account is logged in by second browser end, indicate the streaming media server to described second perhaps
The instruction of browser end transmission dynamic key;
It forwards and instructs in response to the dynamic key, the second browser end of Xiang Suoshu sends dynamic key, so that the stream
Media server is based on the dynamic key and interact depending on networking data with second browser end.
The embodiment of the invention also provides a kind of device of anti-rogue attacks, described device is applied to the first browser end,
First browser end is installed on the first view networked devices, and described device includes:
Duration module is determined, for determining that user account logs in stepping on for streaming media server by first browser end
Record duration;
Dynamic key request module is sent, in the case where the log duration reaches preset duration, to the stream
Media server sends dynamic key request, and the dynamic key request is for close to the streaming media server request dynamic
Key, it is close that the dynamic key is that first browser end with the streaming media server carries out the encryption interacted depending on networking data
Key;
Dynamic key module is received, the dynamic key sent for receiving the streaming media server;
Interaction resetting module is handed over for carrying out view networking data based on the dynamic key and the streaming media server
Mutually, and the log duration is reset;
New key interactive module, in the case where reaching the preset duration for log duration after a reset, Xiang Suoshu
Streaming media server sends new dynamic key request, with the new dynamic key sent based on the streaming media server and institute
It states streaming media server and carries out view networking data interaction.
Optionally, the determining duration module includes:
Start timer submodule, for successfully logging in the stream by first browser end in the user account
When media server, the log duration that starting timer logs in the streaming media server to the user account carries out timing;
It determines duration submodule, logs in the stream for the duration of the timer record to be determined as the user account
The log duration of media server.
Optionally, described device further include:
Authorization request module is received, the login authorization requests sent for receiving the streaming media server, the login
Authorization requests characterize the user account and log in the streaming media server, second browsing by the request of the second browser end
Device end is installed on the second view networked devices;
It sends and updates cipher key module, in the feelings for not allowing the user account to log in by second browser end
Under condition, Xiang Suoshu streaming media server sends dynamic key and updates request, and the dynamic key updates request for the stream
Media server request updates dynamic key;
Cipher key interaction module is updated, the updated dynamic key sent for receiving the streaming media server, and base
Interact depending on networking data with the streaming media server in the updated dynamic key.
Optionally, described device further include:
Instruction module is forwarded, is used in the case where allowing the user account to log in by second browser end,
Dynamic key forwarding instruction is sent to the streaming media server, the dynamic key forwarding instruction is used to indicate the Streaming Media
Server to second browser end send dynamic key so that second browser end be based on the dynamic key with it is described
Streaming media server carries out view networking data interaction.
The embodiment of the invention also provides the device of another anti-rogue attacks, described device is applied to streaming media service
Device, described device include:
First end request module is received, for receiving the dynamic key request of the first browser end transmission, the dynamic is close
Key request is to reach default by the log duration that first browser end logs in the streaming media server in user account
In the case where duration, the request sent by first browser end, first browser end is installed on first and sets depending on networking
It is standby upper;
First end cipher key module is sent, for requesting according to the dynamic key, the first browser end of Xiang Suoshu sends institute
State dynamic key;
Data interaction module is handed over for carrying out view networking data based on the dynamic key and first browser end
Mutually;
Cipher key module after resetting is received, is asked for receiving the new dynamic key that first browser end is sent
It asks, the new dynamic key request is to pass through first browser end in the user account to log in the streaming media service
In the case that log duration after the log duration resetting of device reaches the preset duration, sent by first browser end
Request;
New key module is sent, for requesting according to the new dynamic key, the first browser end of Xiang Suoshu sends institute
State new dynamic key;
First end interactive module, for carrying out view networking number based on the new dynamic key and first browser end
According to interaction.
Optionally, described device further include:
Receive second end request module, for receive user account pass through the second browser end send logging request
When, the first browser end of Xiang Suoshu sends corresponding login authorization requests, and second browser end is installed on the networking of the second view
In equipment;
First end update module is received, updates request, institute for receiving the dynamic key that first browser end is sent
Stating dynamic key to update request is in the case where not allowing the user account to log in by second browser end, to institute
State the request that streaming media server request updates dynamic key;
Response sends update module, requests for updating in response to the dynamic key, the first browser end of Xiang Suoshu hair
Send the updated dynamic key;
Interactive module after update, for carrying out view connection based on the updated dynamic key and first browser end
Network data interaction.
Optionally, described device further include:
First end forwarding module is received, the dynamic key forwarding instruction sent for receiving first browser end, institute
Dynamic key forwarding instruction is stated to indicate institute in the case where allowing the user account to log in by second browser end
State the instruction that streaming media server sends dynamic key to second browser end;
Response sends cipher key interaction module, instructs for forwarding in response to the dynamic key, the second browser of Xiang Suoshu
End sends dynamic key, so that the streaming media server is based on the dynamic key and second browser end carries out view networking
Data interaction.
The embodiment of the present invention also provides a kind of computer readable storage medium, is stored thereon with computer program, the program
It realizes when being executed by processor such as the step in the process described above of the present invention.
The embodiment of the present invention also provides a kind of electronic equipment, including memory, processor and storage are on a memory and can
The computer program run on a processor realizes the step in the process described above of the present invention when the processor executes.
Using the method for the anti-rogue attacks that invention provides, the case where user account log duration reaches preset duration
Under, dynamic key request is sent from the first browser end to streaming media server, and be based on dynamic key and streaming media server
View networking data interaction is carried out, the first browser end resets log duration simultaneously, and log duration after a reset reaches pre- again
If in the case where duration, new dynamic key request is sent to streaming media server, based on new dynamic key and Streaming Media
Server carries out view networking data interaction.Using the present invention program, data are carried out between browser end and streaming media server
Key when interaction is dynamic change, that is, when every the arrivals preset duration of user account log duration, all one keys of replacement,
So that the difficulty for wanting user's breaking cryptographic keys of rogue attacks is greatly improved, a possibility that key is cracked is reduced, from
And achieve the purpose that anti-rogue attacks.
Detailed description of the invention
In order to illustrate the technical solution of the embodiments of the present invention more clearly, below by institute in the description to the embodiment of the present invention
Attached drawing to be used is needed to be briefly described, it should be apparent that, the accompanying drawings in the following description is only some implementations of the invention
Example, for those of ordinary skill in the art, without any creative labor, can also be according to these attached drawings
Obtain other attached drawings.
Fig. 1 is a kind of networking schematic diagram of view networking of the invention;
Fig. 2 is a kind of hardware structural diagram of node server of the invention;
Fig. 3 is a kind of hardware structural diagram of access switch of the invention;
Fig. 4 is the hardware structural diagram that a kind of Ethernet association of the invention turns gateway;
Fig. 5 is a kind of flow chart of the method for anti-rogue attacks of the embodiment of the present invention;
Fig. 6 is a kind of another flow chart of the method for anti-rogue attacks of the embodiment of the present invention;
Fig. 7 is the flow chart of the method for another anti-rogue attacks of the embodiment of the present invention;
Fig. 8 is the schematic diagram of the system of the anti-rogue attacks of the embodiment of the present invention;
Fig. 9 is a kind of block diagram of the device of anti-rogue attacks of the embodiment of the present invention;
Figure 10 is the block diagram of the device of another anti-rogue attacks of the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are some of the embodiments of the present invention, instead of all the embodiments.Based on this hair
Embodiment in bright, every other implementation obtained by those of ordinary skill in the art without making creative efforts
Example, shall fall within the protection scope of the present invention.
It is the important milestone of network Development depending on networking, is a real-time network, can be realized HD video real-time Transmission,
Push numerous Internet applications to HD video, high definition is face-to-face.
Real-time high-definition video switching technology is used depending on networking, it can be such as high in a network platform by required service
Clear video conference, Intellectualized monitoring analysis, emergency command, digital broadcast television, delay TV, the Web-based instruction, shows video monitoring
Field live streaming, VOD program request, TV Mail, individual character records (PVR), Intranet (manages) channel by oneself, intelligent video Broadcast Control, information publication
All be incorporated into a system platform etc. services such as tens of kinds of videos, voice, picture, text, communication, data, by TV or
Computer realizes that high-definition quality video plays.
Embodiment in order to enable those skilled in the art to better understand the present invention is introduced to depending on networking below:
Depending on networking, applied portion of techniques is as described below:
Network technology (Network Technology)
Traditional ethernet (Ethernet) is improved depending on the network technology innovation networked, with potential huge on network
Video flow.(Circuit is exchanged different from simple network packet packet switch (Packet Switching) or lattice network
Switching), Streaming demand is met using Packet Switching depending on networking technology.Has grouping depending on networking technology
Flexible, the simple and low price of exchange, is provided simultaneously with the quality and safety assurance of circuit switching, it is virtually electric to realize the whole network switch type
The seamless connection of road and data format.
Switching technology (Switching Technology)
Two advantages of asynchronous and packet switch that Ethernet is used depending on networking eliminate Ethernet under the premise of complete compatible and lack
It falls into, has the end-to-end seamless connection of the whole network, direct user terminal, directly carrying IP data packet.User data is in network-wide basis
It is not required to any format conversion.It is the more advanced form of Ethernet depending on networking, is a real-time exchange platform, can be realized at present mutually
The whole network large-scale high-definition realtime video transmission that networking cannot achieve pushes numerous network video applications to high Qinghua, unitizes.
Server technology (Server Technology)
It is different from traditional server, its Streaming Media depending on the server technology in networking and unified video platform
Transmission be built upon it is connection-oriented on the basis of, data-handling capacity is unrelated with flow, communication time, single network layer energy
Enough transmitted comprising signaling and data.For voice and video business, handled depending on networking and unified video platform Streaming Media
Complexity many simpler than data processing, efficiency substantially increase hundred times or more than traditional server.
Reservoir technology (Storage Technology)
The ultrahigh speed reservoir technology of unified video platform in order to adapt to the media content of vast capacity and super-flow and
Using state-of-the-art real time operating system, the programme information in server instruction is mapped to specific hard drive space, media
Content is no longer pass through server, and moment is directly delivered to user terminal, and user waits typical time less than 0.2 second.It optimizes
Sector distribution greatly reduces the mechanical movement of hard disc magnetic head tracking, and resource consumption only accounts for the 20% of the internet ad eundem IP, but
The concurrent flow greater than 3 times of traditional disk array is generated, overall efficiency promotes 10 times or more.
Network security technology (Network Security Technology)
Depending on the structural design networked by servicing independent licence system, equipment and the modes such as user data is completely isolated every time
The network security problem that puzzlement internet has thoroughly been eradicated from structure, does not need antivirus applet, firewall generally, has prevented black
The attack of visitor and virus, structural carefree secure network is provided for user.
It services innovative technology (Service Innovation Technology)
Business and transmission are fused together by unified video platform, whether single user, private user or a net
The sum total of network is all only primary automatic connection.User terminal, set-top box or PC are attached directly to unified video platform, obtain rich
The multimedia video service of rich colorful various forms.Unified video platform is traditional to substitute with table schema using " menu type "
Complicated applications programming, considerably less code, which can be used, can be realized complicated application, realize the new business innovation of " endless ".
Networking depending on networking is as described below:
It is a kind of central controlled network structure depending on networking, which can be Tree Network, Star network, ring network etc. class
Type, but centralized control node is needed to control whole network in network on this basis.
As shown in Figure 1, being divided into access net and Metropolitan Area Network (MAN) two parts depending on networking.
The equipment of access mesh portions can be mainly divided into 3 classes: node server, access switch, terminal (including various machines
Top box, encoding board, memory etc.).Node server is connected with access switch, and access switch can be with multiple terminal phases
Even, and it can connect Ethernet.
Wherein, node server is the node that centralized control functions are played in access net, can control access switch and terminal.
Node server can directly be connected with access switch, can also directly be connected with terminal.
Similar, the equipment of metropolitan area mesh portions can also be divided into 3 classes: metropolitan area server, node switch, node serve
Device.Metropolitan area server is connected with node switch, and node switch can be connected with multiple node servers.
Wherein, node server is the node server for accessing mesh portions, i.e. node server had both belonged to access wet end
Point, and belong to metropolitan area mesh portions.
Metropolitan area server is the node that centralized control functions are played in Metropolitan Area Network (MAN), can control node switch and node serve
Device.Metropolitan area server can be directly connected to node switch, can also be directly connected to node server.
It can be seen that be entirely a kind of central controlled network structure of layering depending on networking network, and node server and metropolitan area
The network controlled under server can be the various structures such as tree-shaped, star-like, cyclic annular.
Visually claim, access mesh portions can form unified video platform (part in virtual coil), and multiple unified videos are flat
Platform can form view networking;Each unified video platform can be interconnected by metropolitan area and wide area depending on networking.
Classify depending on networked devices
1.1 embodiment of the present invention can be mainly divided into 3 classes: server depending on the equipment in networking, interchanger (including ether
Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).Depending on networking can be divided on the whole Metropolitan Area Network (MAN) (or
National net, World Wide Web etc.) and access net.
1.2 equipment for wherein accessing mesh portions can be mainly divided into 3 classes: node server, access switch (including ether
Net gateway), terminal (including various set-top boxes, encoding board, memory etc.).
The specific hardware structure of each access network equipment are as follows:
Node server:
As shown in Fig. 2, mainly including Network Interface Module 201, switching engine module 202, CPU module 203, disk array
Module 204;
Wherein, Network Interface Module 201, the Bao Jun that CPU module 203, disk array module 204 are come in enter switching engine
Module 202;Switching engine module 202 look into the operation of address table 205 to the packet come in, to obtain the navigation information of packet;
And the packet is stored according to the navigation information of packet the queue of corresponding pack buffer 206;If the queue of pack buffer 206 is close
It is full, then it abandons;All pack buffer queues of 202 poll of switching engine mould, are forwarded: 1) port if meeting the following conditions
It is less than to send caching;2) the queue package counting facility is greater than zero.Disk array module 204 mainly realizes the control to hard disk, including
The operation such as initialization, read-write to hard disk;CPU module 203 is mainly responsible between access switch, terminal (not shown)
Protocol processes, to address table 205 (including descending protocol packet address table, uplink protocol package address table, data packet addressed table)
Configuration, and, the configuration to disk array module 204.
Access switch:
As shown in figure 3, mainly including Network Interface Module (downstream network interface module 301, uplink network interface module
302), switching engine module 303 and CPU module 304;
Wherein, the packet (upstream data) that downstream network interface module 301 is come in enters packet detection module 305;Packet detection mould
Whether mesh way address (DA), source address (SA), type of data packet and the packet length of the detection packet of block 305 meet the requirements, if met,
It then distributes corresponding flow identifier (stream-id), and enters switching engine module 303, otherwise abandon;Uplink network interface mould
The packet (downlink data) that block 302 is come in enters switching engine module 303;The data packet that CPU module 304 is come in enters switching engine
Module 303;Switching engine module 303 look into the operation of address table 306 to the packet come in, to obtain the navigation information of packet;
If the packet into switching engine module 303 is that downstream network interface is gone toward uplink network interface, in conjunction with flow identifier
(stream-id) packet is stored in the queue of corresponding pack buffer 307;If the queue of the pack buffer 307 is close full,
It abandons;If the packet into switching engine module 303 is not that downstream network interface is gone toward uplink network interface, according to packet
Navigation information is stored in the data packet queue of corresponding pack buffer 307;If the queue of the pack buffer 307 is close full,
Then abandon.
All pack buffer queues of 303 poll of switching engine module, are divided to two kinds of situations in embodiments of the present invention:
If the queue is that downstream network interface is gone toward uplink network interface, meets the following conditions and be forwarded: 1)
It is less than that the port sends caching;2) the queue package counting facility is greater than zero;3) token that rate control module generates is obtained;
If the queue is not that downstream network interface is gone toward uplink network interface, meets the following conditions and is forwarded:
1) it is less than to send caching for the port;2) the queue package counting facility is greater than zero.
Rate control module 308 is configured by CPU module 304, to all downlink networks in programmable interval
Interface generates token toward the pack buffer queue that uplink network interface is gone, to control the code rate of forwarded upstream.
CPU module 304 is mainly responsible for the protocol processes between node server, the configuration to address table 306, and,
Configuration to rate control module 308.
Ethernet association turns gateway:
As shown in figure 4, mainly including Network Interface Module (downstream network interface module 401, uplink network interface module
402), switching engine module 403, CPU module 404, packet detection module 405, rate control module 408, address table 406, Bao Huan
Storage 407 and MAC adding module 409, MAC removing module 410.
Wherein, the data packet that downstream network interface module 401 is come in enters packet detection module 405;Packet detection module 405 is examined
Ethernet mac DA, ethernet mac SA, Ethernet length or frame type, the view networking mesh way address of measured data packet
DA, whether meet the requirements depending on networking source address SA, depending on networking data Packet type and packet length, corresponding stream is distributed if meeting
Identifier (stream-id);Then, MAC DA, MAC SA, length or frame type are subtracted by MAC removing module 410
(2byte), and enter corresponding receive and cache, otherwise abandon;
Downstream network interface module 401 detects the transmission caching of the port, according to the view of packet networking mesh if there is Bao Ze
Address D A knows the ethernet mac DA of corresponding terminal, adds the ethernet mac DA of terminal, Ethernet assists the MAC for turning gateway
SA, Ethernet length or frame type, and send.
The function that Ethernet association turns other modules in gateway is similar with access switch.
Terminal:
It mainly include Network Interface Module, Service Processing Module and CPU module;For example, set-top box mainly connects including network
Mouth mold block, video/audio encoding and decoding engine modules, CPU module;Encoding board mainly includes Network Interface Module, video encoding engine
Module, CPU module;Memory mainly includes Network Interface Module, CPU module and disk array module.
The equipment of 1.3 metropolitan area mesh portions can be mainly divided into 2 classes: node server, node switch, metropolitan area server.
Wherein, node switch mainly includes Network Interface Module, switching engine module and CPU module;Metropolitan area server mainly includes
Network Interface Module, switching engine module and CPU module are constituted.
2, networking data package definition is regarded
2.1 access network data package definitions
Access net data packet mainly include following sections: destination address (DA), source address (SA), reserve bytes,
payload(PDU)、CRC。
As shown in the table, the data packet for accessing net mainly includes following sections:
DA | SA | Reserved | Payload | CRC |
Wherein:
Destination address (DA) is made of 8 bytes (byte), and first character section indicates type (such as the various associations of data packet
Discuss packet, multicast packet, unicast packet etc.), be up to 256 kinds of possibility, the second byte to the 6th byte is metropolitan area net address,
Seven, the 8th bytes are access net address;
Source address (SA) is also to be made of 8 bytes (byte), is defined identical as destination address (DA);
Reserve bytes are made of 2 bytes;
The part payload has different length according to the type of different datagrams, is if it is various protocol packages
64 bytes are 32+1024=1056 bytes if it is single group unicast packets words, are not restricted to above 2 kinds certainly;
CRC is made of 4 bytes, and calculation method follows the Ethernet CRC algorithm of standard.
2.2 Metropolitan Area Network (MAN) packet definitions
The topology of Metropolitan Area Network (MAN) is pattern, may there is 2 kinds, connection even of more than two kinds, i.e. node switching between two equipment
It can all can exceed that 2 kinds between machine and node server, node switch and node switch, node switch and node server
Connection.But the metropolitan area net address of metropolitan area network equipment is uniquely, to close to accurately describe the connection between metropolitan area network equipment
System, introduces parameter in embodiments of the present invention: label, uniquely to describe a metropolitan area network equipment.
(Multi-Protocol Label Switch, multiprotocol label are handed over by the definition of label and MPLS in this specification
Change) label definition it is similar, it is assumed that between equipment A and equipment B there are two connection, then data packet from equipment A to equipment B just
There are 2 labels, data packet also there are 2 labels from equipment B to equipment A.Label is divided into label, outgoing label, it is assumed that data packet enters
The label (entering label) of equipment A is 0x0000, and the label (outgoing label) when this data packet leaves equipment A may reform into
0x0001.The networking process of Metropolitan Area Network (MAN) is to enter network process under centralized control, also means that address distribution, the label of Metropolitan Area Network (MAN)
Distribution be all to be dominated by metropolitan area server, node switch, node server be all passively execute, this point with
The label distribution of MPLS is different, and the distribution of the label of MPLS is the result that interchanger, server are negotiated mutually.
As shown in the table, the data packet of Metropolitan Area Network (MAN) mainly includes following sections:
DA | SA | Reserved | Label | Payload | CRC |
That is destination address (DA), source address (SA), reserve bytes (Reserved), label, payload (PDU), CRC.Its
In, the format of label, which can refer to, such as gives a definition: label is 32bit, wherein high 16bit retains, only with low 16bit, its position
Set is between the reserve bytes and payload of data packet.
Based on the above-mentioned characteristic of view networking, one of the core concepts of the embodiments of the present invention is proposed, it then follows regard the association of networking
View after receiving the log-on message that browser end is sent by streaming media server, sends key to browser end, while user logs in
Timer is created by browser end after browser end, in preset duration, based on close between browser end and streaming media server
Key carries out data interaction, when reaching preset duration, the key that please be look for novelty to streaming media server again from browser end, later
Data interaction is carried out using new key between browser end and streaming media server, is improved long-range by tools such as browsers
Configure safety when streaming media server operation.
When inventor has found existing to remotely accessing depending on streaming media server in networking and configuring operation, because logical
Cross the encryption key when tools such as browser and streaming media server carry out data interaction be it is constant, such key is easy for
It is maliciously cracked, is stolen so as to cause data.
Such as: after view on-line customer Li Si logs in streaming media server by the browser end on a view networked devices,
Streaming media server sends a key to the browser end, and Li Si is carried out by the browser end and streaming media server later
It is all based on the key when data interaction and implements encryption, it is assumed that Li Si carries out data friendship by the browser end and streaming media server
Mutually it continue for 30 minutes, and the time that another malice possesses abundance depending on two pockmarks of on-line customer during this period carries out brokenly the key
Solution, that is, rogue attacks success rate is carried out with streaming media server data interaction to the browser end and is greatly increased, to obtain Lee
Four carry out all data when data interaction by the browser end and streaming media server, it might even be possible to obtain the whole of Li Si
All information in information and streaming media server has seriously threatened the peace of Li Si's personal data and streaming media server data
Entirely.
In view of the above-mentioned problems, inventor, by further investigation, creative proposing passes through browser end in user account
Timer is created when logging in streaming media server and timing is carried out to user account log duration, when log duration reaches default
The key more renewed when long, browser end carry out data interaction based on new key and streaming media server.The invention enables numbers
Key when according to interaction can greatly improve the difficulty of breaking cryptographic keys, to achieve the purpose that anti-rogue attacks with dynamic mapping.
Detailed explanation and illustration is carried out to the present invention program below.
Fig. 5 shows a kind of flow chart of the method for anti-rogue attacks of the embodiment of the present invention, and it is clear that this method is applied to first
Look at device end, the first browser end is installed on the first view networked devices, and the method for anti-rogue attacks includes the following steps:
Step 101: determining that user account logs in the log duration of streaming media server by the first browser end.
In the embodiment of the present invention, user logs in streaming media server by the first browser end, with convection media server
It accesses and configures, wherein the first browser end is installed on the first view networked devices, it is to be appreciated that the first view networking
Equipment is depending on any equipment that can install browser end in networking, and be mounted on first is depending on the browser end on networked devices
First browser end.Account is needed when user logs under normal circumstances, the account title and account number cipher of the account are only used
Family itself knows, user must input the account title and close of itself first when logging in streaming media server by browser end
Code, and account title and password correctly can just log on streaming media server.After logging in streaming media server, determine
User account logs in the log duration of streaming media server by browser end.
Such as: view on-line customer Li Si needs to access and configure streaming media server, and Li Si passes through the first view networked devices
On the first browser end log in streaming media server, wherein first view networked devices physical address are as follows: 30-5D-66-DC-
08-26;The account title of Li Si are as follows: Seiya, password are as follows: FreeSaint;Li Si inputs itself account on the first browser end
Number, streaming media server verifying account title password is correct, and Li Si successfully logs in streaming media server, starts to step on Li Si at this time
The log duration of record streaming media server is recorded.
Optionally, step 101 specifically includes:
Step 101a: when user account successfully logs in streaming media server by the first browser end, start timer
The log duration for logging in streaming media server to user account carries out timing.
Step 101b: the duration of timer record is determined as the log duration that user account logs in streaming media server.
In the embodiment of the present invention, by browser end when user account successfully logs in streaming media server, a meter is created
When device, the timer be used for user account log in streaming media server log duration carry out timing, when user account success
When logging in streaming media server, timing is carried out by the log duration that the timer logs in streaming media server to user account,
The duration of timer record is the log duration that user account logs in streaming media server.
Such as Streaming Media clothes are successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si
When business device, the first browser end creates a timer, and the log duration for starting to log in Li Si streaming media server is counted
When, it is assumed that it is 30 minutes when timer, then the log duration that Li Si logs in streaming media server is just 30 minutes.
Step 102: in the case where log duration reaches preset duration, sending dynamic key to streaming media server and ask
It asks, dynamic key request is for streaming media server request dynamic key, dynamic key to be the first browser end and Streaming Media
Server carries out the encryption key of view networking data interaction.
In the embodiment of the present invention, after user account successfully logs in streaming media server, its log duration is recorded,
In the case where log duration reaches preset duration, the first browser end actively sends dynamic key to streaming media server and asks
It asks, dynamic key request is for streaming media server request dynamic key, dynamic key to be the first browser end and stream matchmaker
Body server carries out the encryption key of view networking data interaction.
It should be noted that streaming media server can be at once to after user account successfully logs in streaming media server
One browser end sends a key, which is that streaming media server generates at random, has time-bounded key, in user
In this period that the log duration that account successfully logs in streaming media server to user account arrives preset duration up to first time, stream
Data interaction between media server and the first browser end is all based on the key, until the log duration of user account
When reaching preset duration for the first time, the first browser end sends dynamic key request to streaming media server, which asks
It asks for streaming media server request dynamic key.
Such as: Streaming Media clothes are successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si
When business device, the first browser end creates a timer, and the log duration for starting to log in Li Si streaming media server is counted
When, it is assumed that preset duration be 6 minutes, then Li Si log in streaming media server login after, streaming media server at once just to
First browser end sends a key, within 0 minute~6 minute this period, the first browser end and streaming media server
Between based on the key carry out data interaction.When the timing duration of timer reaches 6 minutes, the first browser end is actively to stream
Media server sends dynamic key request.
Step 103: the dynamic key that receiving stream media server is sent.
It, can be random after streaming media server receives the transmission dynamic key request of the first browser end in the embodiment of the present invention
Generate a dynamic key, this dynamic key has time-bounded, and validity period is more than or equal to preset duration.It is raw in dynamic key
The dynamic key is sent to the first browser end by Cheng Hou, streaming media server, and it is close that the first browser end will receive the dynamic
Key.
Step 104: interact depending on networking data with streaming media server based on dynamic key, and reset log duration.
In the embodiment of the present invention, after the dynamic key that the first browser end receives streaming media server transmission, at 0 point
The encryption key that the first browser end carries out data interaction with streaming media server when clock~6 minute just ceases to be in force automatically.Later
The encryption key that one browser end and streaming media server carry out data interaction just becomes the dynamic that streaming media server is newly sent
Key, the first browser end can reset the log duration of user account at the same time, that is, user account when timer passes through
The log duration that first browser end logs in streaming media server will be cleared, timer reclocking.
Such as: Streaming Media clothes are successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si
It is engaged in after device, within 0 minute~6 minute this period, it is assumed that 1# key is based between the first browser end and streaming media server
Carry out data interaction.When the first browser end receiving stream media server send 2# dynamic key after, the first browser end with
Data interaction is carried out based on 2# dynamic key between streaming media server, while the timing duration of timer is reset, and is restarted
Timing.That is, carrying out data interaction based on 2# dynamic key between the first browser end and streaming media server, together after 6 minutes
When timer again since 0 to the log duration of user account timing.
Step 105: in the case that log duration after a reset reaches preset duration, being sent newly to streaming media server
Dynamic key request, carries out view networking data with the new dynamic key and streaming media server that send based on streaming media server
Interaction.
In the embodiment of the present invention, data are carried out based on 2# dynamic key between the first browser end and streaming media server
Interaction, while the timing duration resetting of timer is reset after restarting timing, when the log duration of user account reaches again
In the case where preset duration, the first browser end sends new dynamic key request, Streaming Media to streaming media server again
It is random to generate 3# dynamic key after server receives the request, and it is sent to the first browser end;First browser end later
Interact depending on networking data with streaming media server based on 3# dynamic key, while the timing duration of timer resets clearing again
Restart timing.
From the above mentioned, and so on, as long as the log duration of user account reaches preset duration, the dynamic more renewed is close
Key, the encryption key that whole process continues the data interaction between the first browser end of period and streaming media server do not stop to become
Change, until user account is logged off, does not visit again and configure streaming media server.And preset duration can as desired certainly
Row setting, if needing higher safety, better anti-rogue attacks, then preset duration is set it is shorter, although meeting
The working efficiency of convection media server generates certain influence, but compared to the aspect of performance of safety and anti-rogue attacks ratio
Compared with the influence can be ignored.
Such as: Streaming Media clothes are successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si
It is engaged in after device, within 0 minute~6 minute this period, it is assumed that 1# key is based between the first browser end and streaming media server
Carry out data interaction;When the first browser end receiving stream media server send 2# dynamic key after, the first browser end with
Data interaction is carried out based on 2# dynamic key between streaming media server, while the timing duration of timer is reset, and is restarted
Timing;Li Si logged in 6 minutes~12 minute this period of the first browser end, the log duration 6 of Li Si when timer
Minute, data interaction is carried out based on 2# key between the first browser end and streaming media server, Li Si logs in the first browser
When holding 12 minutes, the 3# dynamic key that the first browser end receiving stream media server is sent, while the timing duration of timer
It resets again, data interaction is carried out based on 3# dynamic key between the first browser end and streaming media server, timer is opened again
Beginning timing 6 minutes.
Assuming that malice view two pockmarks of on-line customer are thought after Li Si logs in streaming media server by the first browser end
Malice steals the total data information of Li Si, it is necessary to crack progress data friendship between the first browser end and streaming media server
Mutual encryption key, but breaking cryptographic keys need the time, it is assumed that two pockmarks need 6 minutes or more just can with breaking cryptographic keys,
But the transformation in encryption key every 6 minutes that data interaction is carried out between the first browser end and streaming media server are primary, therefore
Two pockmarks are impossible to crack the encryption key that data interaction is carried out between the first browser end and streaming media server, thus nothing
Method successfully realizes rogue attacks, can not steal the data of Li Si and streaming media server.
Assuming that just need 6 minutes just can be with breaking cryptographic keys, between the first browser end and streaming media server for two pockmarks
The transformation in encryption key every 6 minutes for carrying out data interaction are primary, and two pockmarks also can not successfully realize rogue attacks, because of two pockmarks
Encryption key has just been cracked, the encryption key that data interaction is carried out between the first browser end and streaming media server just changes,
Two pockmarks need to crack again, therefore two pockmarks are also impossible to crack and be counted between the first browser end and streaming media server
According to interactive encryption key, so that rogue attacks can not be realized successfully, the data of Li Si and streaming media server can not be stolen.
Assuming that two pockmarks within 6 minutes can breaking cryptographic keys, carried out between the first browser end and streaming media server
Transformation in the encryption key of data interaction every 6 minutes is primary, two pockmarks be possible to the first browser end and streaming media server it
Between carry out cracking encryption key in 6 minutes of data interaction, two pockmarks start to steal data later, but its data stolen is very
It is limited because variation in encryption key every 6 minutes is primary, after key conversion two pockmarks also need first to crack after transformation key just can be with
Data are stolen again.And within duration needed for preset duration is shortened to two pockmarks breaking cryptographic keys, two fiber crops are just prevented completely
Son steals a possibility that data so that two pockmarks can not successfully realize rogue attacks, ensure that Li Si personal data and
The safety of streaming media server data.
Optionally, referring to Fig. 6, flow chart the step of when showing a kind of situation in the method for anti-rogue attacks, in reality
It there is also another situation in the application of border, determining user account stepping on by the first browser end login streaming media server
After recording duration, the method for anti-rogue attacks further include:
Step 201: it is logical to log in authorization requests characterization user account for the login authorization requests that receiving stream media server is sent
It crosses the request of the second browser end and logs in streaming media server, the second browser end is installed on the second view networked devices.
In the embodiment of the present invention, it is understood that there may be such a case, due to factors such as original subscriber's account leakages, so that other
Malice is aware of the title and password of original subscriber's account depending on on-line customer, then being stepped in original subscriber's account by the first browser end
After recording streaming media server, which is stepped on using the title and password of original subscriber's account in the second browser end depending on on-line customer
Streaming media server is recorded, wherein the second browser end is installed on the second view networked devices, view on-line customer uses original when malice
For the title and password of user account when the second browser end logs in streaming media server, streaming media server receives the login
When request, logged on streaming media server since original subscriber's account has passed through the first browser end, streaming media server is sentenced
The physical address of the first view networked devices where disconnected first browser end is set with second where the second browser end depending on networking
Standby physical address is different, therefore streaming media server can send to the first browser end and log in authorization requests, which awards
Power request characterization original subscriber's account logs in streaming media server by the request of the second browser end.
Such as: Streaming Media clothes are successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si
It is engaged in after device, data interaction, streaming media server meeting after Li Si logs in is carried out between the first browser end and streaming media server
Record its account title: the physical address of the view networked devices of Seiya and first are as follows: 30-5D-66-DC-08-26.When malice view connection
Two pockmarks of network users use the account title of Li Si: Seiya, password: when FreeSaint logs in streaming media server, Streaming Media
Server judges that user's name is identical, is all Seiya, but the physical address of the second view networked devices are as follows: 34-8D-96-DC-
18-86, different from the first view physical address of networked devices, then streaming media server can send to the first browser end and log in
The request is shown that on the front end display screen of the first view networked devices, Li Si can be with first by authorization requests, the first browser end
Time is known.
Step 202: in the case where not allowing user account to log in by the second browser end, being sent out to streaming media server
Dynamic key is sent to update request, dynamic key updates request and updates dynamic key for requesting to streaming media server.
Step 203: the updated dynamic key that receiving stream media server is sent, and it is based on updated dynamic key
Interact depending on networking data with streaming media server.
In the embodiment of the present invention, after the login authorization requests that the first browser end receives streaming media server transmission,
Original subscriber is known that other people have logged in streaming media server with the account of itself, when original subscriber is considered that account number reveals quilt
When other people usurp, account number is not allowed for log in streaming media server by the second browser end, is taken at once to Streaming Media
Business device sends dynamic key and updates request, and dynamic key, which updates, requests for requesting to update dynamic key to streaming media server,
After streaming media server receives the request, dynamic key is updated immediately, and send updated dynamic to the first browser end
Key, the first browser end are based on updated dynamic key and interact depending on networking data with streaming media server, while former
User modifies the account number cipher of itself at once, is stolen and usurps again to prevent account.Streaming media server will not respond malice and regard
On-line customer logs in the request of streaming media server using original subscriber's account by the second browser end, and to the second browser end
End sends refusal log-on message, and malice can not just log in streaming media server depending on on-line customer.
If it is who is logging in streaming media server with the account of itself that original subscriber, which knows, account number is allowed to pass through second
In the case that browser end logs in, the first browser end sends dynamic key forwarding instruction, dynamic key to streaming media server
Forwarding instruction is used to indicate streaming media server and sends dynamic key to the second browser end, so that the second browser end is based on being somebody's turn to do
Dynamic key interact depending on networking data with streaming media server, i.e., original subscriber's account logs in stream matchmaker by the second browser end
The success of body server, original subscriber's account is automatically offline in the first browser end at this time.
Assuming that being that malice passes through the first browser end login streaming media server depending on on-line customer in advance, and has modified former use
The password of family account, then will show and step on when later period original subscriber's account logs in streaming media server by the second browser end
Password mistake is recorded, original subscriber's account knows that itself password is revealed naturally, immediately passes through the reconditioning of password retrieval function and modifies itself account
Number password, original subscriber's account re-starts login with modified password later.
Assuming that being that malice passes through the first browser end login streaming media server depending on on-line customer in advance, but no modification is former
The password of user account, if that original subscriber's account logs in Streaming Media clothes by the first browser end or the second browser end
The time of business device does not log in streaming media server by the first browser end depending on on-line customer with malice and conflicts, then original subscriber's account
When number logging in streaming media server success by the first browser end or the second browser end, streaming media server can Xiang Yuanyong
The browser end that family account uses sends original subscriber's account and carried out the information logged at what time, and original subscriber can be according to this
Information judges whether account number is leaked and steals that original subscriber's account can immediately pass through password retrieval function reconditioning modification itself
Account number cipher, original subscriber's account re-starts login with modified password later.
Assuming that being that malice passes through the first browser end login streaming media server depending on on-line customer in advance, but no modification is former
The password of user account, if that original subscriber's account logs in time and the malice of streaming media server by the second browser end
Streaming media server conflict is logged in by the first browser end depending on on-line customer, that is, original subscriber's account passes through the second browser end
When logging in streaming media server, malice is passing through the first browser end depending on on-line customer and streaming media server carries out data friendship
Mutually, then malice is depending on on-line customer can receive the login authorization requests of streaming media server transmission by the first browser end,
At this time if malice does not allow original subscriber's account to log in streaming media server, Streaming Media by the second browser end depending on on-line customer
Server is not responding to the request that original subscriber's account logs in streaming media server by the second browser end naturally, and browses to second
Device end end sends refusal log-on message, and original subscriber will know that account number is stolen;If malice view on-line customer allows former
User account logs in streaming media server by the second browser end, moves then streaming media server is sent to the second browser end
Original subscriber's account is also sent while state key and carried out the information logged at what time, and original subscriber's account passes through the second browsing
Device end logs in streaming media server success, but original subscriber is known that the account of itself carried out login at what time, from
So it is known that account number is stolen.
Such as: Streaming Media clothes are successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si
It is engaged in after device, data interaction, streaming media server meeting after Li Si logs in is carried out between the first browser end and streaming media server
Record its account title: the physical address of the view networked devices of Seiya and first are as follows: 30-5D-66-DC-08-26.When malice view connection
Two pockmarks of network users use the account title of Li Si: Seiya, password: when FreeSaint logs in streaming media server, Streaming Media
Server judges that user's name is identical, is all Seiya, but the physical address of the second view networked devices are as follows: 34-8D-96-DC-
18-86, different from the first view physical address of networked devices, then streaming media server can send to the first browser end and log in
The request is shown that on the front end display screen of the first view networked devices, Li Si can be with first by authorization requests, the first browser end
Time is known.
Assuming that Li Si is considered that account number leakage is usurped by other people, account number is not allowed to pass through the second browser end
Streaming media server is logged in, dynamic key is sent to streaming media server at once and updates request, streaming media server receives this
After request, dynamic key is updated immediately, and send updated dynamic key to the first browser end, the first browser end is based on
Updated dynamic key interact depending on networking data with streaming media server, at the same Li Si modify at once itself account it is close
Code, is stolen again to prevent account and usurps.Streaming media server will not respond two pockmarks of user using the account of Li Si by the
Two browser ends log in the request of streaming media server, and send refusal log-on message, two fiber crops of user to the second browser end end
Son can not just log in streaming media server.
Assuming that it is who is logging in streaming media server with the account of itself that Li Si, which knows, account number is allowed to pass through second
In the case that browser end logs in, the first browser end sends dynamic key forwarding instruction to streaming media server, later Li Si
Account by the second browser end log in streaming media server success, the account of Li Si is in the case where the first browser end is automatic at this time
Line.
Assuming that being maliciously to pass through the first browser end in advance depending on two pockmarks of on-line customer to log in streaming media server, and modify
The password of the account of Li Si, then will show and step on when later period Li Si logs in streaming media server by the second browser end
Password mistake is recorded, Li Si knows that itself password is revealed naturally, password retrieval function reconditioning modification account number password is immediately passed through,
Li Si re-starts login with modified password later.
Assuming that being maliciously to pass through the first browser end in advance depending on two pockmarks of on-line customer to log in streaming media server, but do not have
The password of the account of Li Si is modified, if that the account of Li Si logs in stream by the first browser end or the second browser end
The time of media server does not log in streaming media server by the first browser end with two pockmarks and conflicts, then the account of Li Si
When logging in streaming media server success by the first browser end or the second browser end, streaming media server can be to Li Si
The account that the browser end that account uses sends Li Si carried out the information logged at what time, and Li Si can be according to the information
Judging whether account number is leaked to steal, Li Si can immediately pass through password retrieval function reconditioning modification account number password,
Li Si re-starts login with modified password later.
Assuming that being maliciously to pass through the first browser end in advance depending on two pockmarks of on-line customer to log in streaming media server, but do not have
The password of the account of Li Si is modified, if that the account of Li Si logs in the time of streaming media server by the second browser end
It logs in streaming media server by the first browser end with two pockmarks to conflict, that is, the account of Li Si is stepped on by the second browser end
When recording streaming media server, two pockmarks are passing through the first browser end and streaming media server carries out data interaction, then two
Pockmarks can receive the login authorization requests of streaming media server transmission by the first browser end, at this time if two pockmarks do not permit
Perhaps the account of Li Si logs in streaming media server by the second browser end, and streaming media server is not responding to the account of Li Si naturally
The request of streaming media server is logged in by the second browser end, and sends refusal log-on message, Lee to the second browser end end
Four will know that account number is stolen;It is taken if two pockmarks allow original subscriber's account to log in Streaming Media by the second browser end
Business device, then what when streaming media server also sends the account of Li Si in while sending dynamic key to the second browser end
Between carried out the information logged in, Li Si logs in streaming media server success by the second browser end, but Li Si is known that
The account of itself carried out login at what time, was known that account number is stolen naturally.
In conclusion the solution of the present invention both ensure that the safety of user's data and streaming media server data,
It also ensures that user has found that account number leakage is stolen in time, so as to time update account number cipher, equally improves safety.
Referring to Fig. 7, the flow chart of the method for another anti-rogue attacks of the embodiment of the present invention is shown, this method is applied to
The method of streaming media server, anti-rogue attacks includes:
Step 301: receiving the dynamic key request that the first browser end is sent, dynamic key request is logical in user account
Cross the first browser end log in streaming media server log duration reach preset duration in the case where, by the first browser end send out
The request sent, the first browser end are installed on the first view networked devices.
Step 302: being requested according to dynamic key, send dynamic key to the first browser end.
Step 303: interact depending on networking data with the first browser end based on dynamic key.
Step 304: receive the new dynamic key request that the first browser end is sent, new dynamic key request for
The log duration that family account logs in after the log duration resetting of streaming media server by the first browser end reaches preset duration
In the case where, by the request of the first browser end transmission.
Step 305: being requested according to new dynamic key, new dynamic key is sent to the first browser end.
Step 306: interact depending on networking data with the first browser end based on new dynamic key.
In the embodiment of the present invention, step 601~step 606 sends for streaming media server according to the first browser end each
A request, in response to the method for each request, to reach the method for realizing anti-rogue attacks with the first browser end collective effect
The step of, it comprises the concrete steps that:
Streaming media server after user account logins successfully, send out by the first browser end that can actively use to user account
A key is sent, data interaction is carried out based on the key and the first browser end later, is reached in the log duration of user account
When preset duration, streaming media server can receive the dynamic key request of the first browser end transmission, streaming media server root
It is requested according to dynamic key, sends dynamic key to the first browser end, carried out later based on dynamic key and the first browser end
Depending on networking data interaction.
When the log duration of user account reaches preset duration again, streaming media server receives the first browser end
The new dynamic key request sent, streaming media server are requested according to new dynamic key, are sent to the first browser end new
Dynamic key, interact depending on networking data with the first browser end based on new dynamic key later.
Likewise, when there is the case where malice view on-line customer logs in streaming media server using original subscriber's account, stream
Media server passes through the logging request of the second browser end transmission receiving original subscriber's account, judges that account title is identical,
Corresponding login authorization requests just are sent to the first browser end, if original subscriber refuses original subscriber's account and passes through the second browser
End logs in streaming media server, then the dynamic key that streaming media server receives that the first browser end is sent updates request, response
It updates and requests in dynamic key, send updated dynamic key to the first browser end, and refuse to the transmission of the second browser end
Exhausted log-on message interact depending on networking data with the first browser end based on updated dynamic key later.
And after streaming media server sends corresponding login authorization requests to the first browser end, streaming media server
The dynamic key forwarding instruction of the first browser end transmission is received, streaming media server is forwarded in response to dynamic key and is instructed,
Dynamic key is sent to the second browser end, interact depending on networking data with the second browser end based on the dynamic key.
In addition, streaming media server itself may include timer, it is close based on one after user account logins successfully
Key interact depending on networking data with browser end, and starts own timer and step on to user account login streaming media server
Record duration carries out timing and does not receive clear in the case where the timing of streaming media server timer reaches default timing duration
The new dynamic key that device end is sent of looking at is requested, it is believed that browser end breaks down, and streaming media server is actively to browser end
Send new dynamic key, the timer of certain streaming media server it is pre-designed constantly it is long be greater than browser end it is default when
It is long.
If receiving browsing in the case where the timing of the timer of streaming media server not up to default timing duration
The new dynamic key request that device end is sent, it is believed that browser end works normally, and streaming media server resets own timer pair
User account logs in the timing duration of the log duration of streaming media server.
Using this dual dynamic key salvo, the reliability of the present invention program is more improved, is perfectly reached
The purposes of anti-rogue attacks.
As shown in figure 8, showing the schematic diagram of the system of the anti-rogue attacks of the embodiment of the present invention, which includes the first view
Networked devices, the first browser end being mounted thereon;Second depending on networked devices, the second browser end being mounted thereon and
Streaming media server, it is assumed that preset duration is 3 minutes.
Streaming media server is successfully logged in depending on the first browser end on networked devices by first depending on on-line customer Li Si
Afterwards, streaming media server sends 1# key to the first browser end at the first time, the first browser end and streaming media server it
Between data interaction carried out based on 1# key, while streaming media server will record its account title after Li Si logs in: Seiya and
The physical address of first view networked devices: 30-5D-66-DC-08-26, and the login that Li Si is logged in using the timer of itself
Duration carries out timing, and the preset duration of the timer of streaming media server is 4 minutes.Streaming media server is successfully logged in Li Si
After success, the first browser end creates a timer and starts to count the log duration of Li Si's login streaming media server
When, when the log duration of the Li Si in timer reaches 3 minutes, the first browser end sends dynamic to streaming media server
Key request, streaming media server respond the request and generate 2# key at random, and the validity period of 2# key is more than or equal to the first browsing
The duration of the timer of device end creation, and the timing duration of own timer is reset simultaneously.The first browser end is based on 2# later
Key and streaming media server carry out data interaction.Such every 3 minutes one secondary keys of replacement are repeated up to Li Si and exit and step on
Record streaming media server.
Assuming that in the above process, there is mistake or failure in the first browser end, there is no according to every 3 minutes to Streaming Media
The dynamic key request that server is sent, then when the log duration of Li Si reaches 4 minutes, streaming media server is actively to the
One browser end sends dynamic key, and such double shield mechanism more ensure that the safety of data, anti-rogue attacks
Ability is stronger.
When malice view two pockmarks of on-line customer use the account title of Li Si: Seiya, password: FreeSaint passes through second
Browser end request logs in streaming media server, and Li Si is passing through the first browser end and logs in streaming media server at this time
On, it is all Seiya that streaming media server judges user's name is identical, but the physical address of the second view networked devices are as follows: 34-
8D-96-DC-18-86, different from the first view physical address of networked devices, then streaming media server can be to the first browser
End, which is sent, logs in authorization requests, and the first browser end shows the request on the front end display screen of the first view networked devices, Lee
Four know that account number leakage is stolen.
Li Si does not allow account number to log in streaming media server by the second browser end, at once to streaming media server
It sends dynamic key and updates request, while modifying the password of account number at once, streaming media server receives dynamic key more
After new request, dynamic key is updated immediately, and send updated dynamic key, the first browser end group to the first browser end
Interact depending on networking data with streaming media server in updated dynamic key.Streaming media server will not respond user two
Pockmarks log in the request of streaming media server using the account of Li Si by the second browser end, and send out to the second browser end end
Send refusal log-on message, two pockmarks of user can not just log in streaming media server, and because Li Si has modified account number cipher, and two
The account number cipher that pockmarks must steal Li Si again can just reuse the account of Li Si.
If Fig. 9 shows a kind of block diagram of the device of anti-rogue attacks of the embodiment of the present invention, it is clear which is applied to first
Look at device end, the first browser end is installed on the first view networked devices, and the device of anti-rogue attacks includes:
Duration module 410 is determined, for determining that user account logs in stepping on for streaming media server by the first browser end
Record duration;
Dynamic key request module 420 is sent, for being taken to Streaming Media in the case where log duration reaches preset duration
Device of being engaged in sends dynamic key request, and dynamic key request is for streaming media server request dynamic key, dynamic key the
One browser end carries out the encryption key interacted depending on networking data with streaming media server;
Dynamic key module 430 is received, the dynamic key sent for receiving stream media server;
Interaction resetting module 440 is laid equal stress on for interact depending on networking data with streaming media server based on dynamic key
Set log duration;
New key interactive module 450, in the case where reaching preset duration for log duration after a reset, to Streaming Media
Server sends new dynamic key request, with the new dynamic key and streaming media server sent based on streaming media server
Carry out view networking data interaction.
Optionally it is determined that duration module includes:
Start timer submodule, for successfully logging in streaming media server by the first browser end in user account
When, the log duration that starting timer logs in streaming media server to user account carries out timing;
It determines duration submodule, logs in streaming media server for the duration of timer record to be determined as user account
Log duration.
Optionally, the device of anti-rogue attacks further include:
Authorization request module is received, for the login authorization requests that receiving stream media server is sent, logs in authorization requests
It characterizes user account and streaming media server is logged in by the request of the second browser end, the second browser end is installed on the networking of the second view
In equipment;
Send update cipher key module, for do not allow user account by the second browser end log in the case where, to
Streaming media server sends dynamic key and updates request, and it is dynamic for updating to streaming media server request that dynamic key updates request
State key;
Cipher key interaction module is updated, for the updated dynamic key that receiving stream media server is sent, and based on more
Dynamic key after new interact depending on networking data with streaming media server.
Optionally, the device of anti-rogue attacks further include:
Instruction module is forwarded, is used in the case where allowing user account to log in by the second browser end, to Streaming Media
Server sends dynamic key forwarding instruction, and dynamic key forwarding instruction is used to indicate streaming media server to the second browser end
Dynamic key is sent, so that the second browser end is based on the dynamic key and interact depending on networking data with streaming media server.
If Figure 10 shows the block diagram of the device of another anti-rogue attacks of the embodiment of the present invention, which is applied to stream matchmaker
The device of body server, another anti-rogue attacks includes:
First end request module 510 is received, for receiving the dynamic key request of the first browser end transmission, dynamic key
Request is the case where user account reaches preset duration by the log duration that the first browser end logs in streaming media server
Under, the request sent by the first browser end, the first browser end is installed on the first view networked devices;
First end cipher key module 520 is sent, for requesting according to dynamic key, it is close to send dynamic to the first browser end
Key;
Data interaction module 530, for interact depending on networking data with the first browser end based on dynamic key;
Cipher key module 540 after resetting is received, for receiving the new dynamic key request of the first browser end transmission, newly
Dynamic key request is stepping on after user account logs in the log duration resetting of streaming media server by the first browser end
In the case that record duration reaches preset duration, by the request of the first browser end transmission;
New key module 550 is sent, for sending new dynamic to the first browser end according to new dynamic key request
Key;
First end interactive module 560 is handed over for carrying out view networking data based on new dynamic key and the first browser end
Mutually.
Optionally, the device of another anti-rogue attacks further include:
Receive second end request module, for receive user account pass through the second browser end send logging request
When, corresponding login authorization requests are sent to the first browser end, the second browser end is installed on the second view networked devices;
First end update module is received, the dynamic key for receiving the transmission of the first browser end updates request, and dynamic is close
It is in the case where not allowing user account to log in by the second browser end, more to streaming media server request that key, which updates request,
The request of new dynamic key;
Response sends update module, requests for updating in response to dynamic key, is sent after updating to the first browser end
Dynamic key;
Interactive module after update is handed over for carrying out view networking data based on updated dynamic key and the first browser end
Mutually.
Optionally, the device of another anti-rogue attacks further include:
First end forwarding module is received, for receiving the dynamic key forwarding instruction of the first browser end transmission, dynamic is close
Key forwarding instructs in the case where allowing user account to log in by the second browser end, to indicate streaming media server to second
The instruction of browser end transmission dynamic key;
Response sends cipher key interaction module, instructs for forwarding in response to dynamic key, sends to the second browser end dynamic
State key, so that streaming media server is based on the dynamic key and interact depending on networking data with the second browser end.
Through the foregoing embodiment, a kind of method and apparatus of anti-rogue attacks of the present invention, pass through browser in user account
End records its log duration while login, in the case where log duration reaches preset duration, by the first browser
It holds to streaming media server and sends dynamic key request, and view networking data is carried out based on dynamic key and streaming media server and is handed over
Mutually, browser end resets log duration simultaneously, in the case that log duration after a reset reaches preset duration again, to stream matchmaker
Body server sends new dynamic key request, is handed over carrying out view networking data based on new dynamic key and streaming media server
Mutually.And after user account leakage steals use by malicious user, malicious user can be prevented to steal user account data
With the data of streaming media server.Using the present invention program, data interaction is carried out between browser end and streaming media server
When key be dynamic change, that is, when the every arrival preset duration of user account log duration, all replace a key so that
The user for wanting rogue attacks does not have time enough breaking cryptographic keys, greatly improves the difficulty of other malicious user breaking cryptographic keys
Degree, to achieve the purpose that anti-rogue attacks.
It should be understood by those skilled in the art that, the embodiment of the embodiment of the present invention can provide as method, apparatus or calculate
Machine program product.Therefore, the embodiment of the present invention can be used complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.Moreover, the embodiment of the present invention can be used one or more wherein include computer can
With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form of the computer program product of implementation.
The embodiment of the present invention be referring to according to the method for the embodiment of the present invention, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these
Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices
Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices
In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet
The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart
And/or in one or more blocks of the block diagram specify function the step of.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, herein, the terms "include", "comprise" or its it is any its
He is intended to non-exclusive inclusion by variant, so that process, method, article or device including a series of elements are not
Only include those elements, but also including other elements that are not explicitly listed, or further include for this process, method,
Article or the intrinsic element of device.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the device for including the element.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited to above-mentioned specific
Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art
Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much
Form, all of these belong to the protection of the present invention.
Claims (11)
1. a kind of method of anti-rogue attacks, which is characterized in that the method is applied to the first browser end, first browsing
Device end is installed on the first view networked devices, which comprises
Determine that user account logs in the log duration of streaming media server by first browser end;
In the case where the log duration reaches preset duration, Xiang Suoshu streaming media server sends dynamic key request, institute
Dynamic key request is stated for the streaming media server request dynamic key, the dynamic key to be first browser
End carries out the encryption key interacted depending on networking data with the streaming media server;
Receive the dynamic key that the streaming media server is sent;
Interact depending on networking data with the streaming media server based on the dynamic key, and resets the log duration;
In the case that log duration after a reset reaches the preset duration, Xiang Suoshu streaming media server sends new dynamic
Key request carries out view networking with the new dynamic key and the streaming media server that send based on the streaming media server
Data interaction.
2. the method according to claim 1, wherein determining that user account is logged in by first browser end
The log duration of streaming media server, comprising:
When the user account successfully logs in the streaming media server by first browser end, start timer pair
The log duration that the user account logs in the streaming media server carries out timing;
The duration of the timer record is determined as the log duration that the user account logs in the streaming media server.
3. the method according to claim 1, wherein determining that user account stepped on by first browser end
After the log duration for recording streaming media server, the method also includes:
The login authorization requests that the streaming media server is sent are received, it is logical that the login authorization requests characterize the user account
It crosses the request of the second browser end and logs in the streaming media server, second browser end is installed on the second view networked devices
On;
In the case where not allowing the user account to log in by second browser end, Xiang Suoshu streaming media server hair
Dynamic key is sent to update request, it is close for updating dynamic to streaming media server request that the dynamic key updates request
Key;
The updated dynamic key that the streaming media server is sent is received, and is based on the updated dynamic key and institute
It states streaming media server and carries out view networking data interaction.
4. according to the method described in claim 3, it is characterized in that, in the login authorization for receiving the streaming media server transmission
After request, the method also includes:
In the case where allowing the user account to log in by second browser end, Xiang Suoshu streaming media server is sent
Dynamic key forwarding instruction, the dynamic key forwarding instruction are used to indicate the streaming media server to second browser
End sends dynamic key, so that second browser end is based on the dynamic key and the streaming media server carries out view networking
Data interaction.
5. a kind of method of anti-rogue attacks, which is characterized in that the method is applied to streaming media server, the method packet
It includes:
Receive the dynamic key request of the first browser end transmission, dynamic key request is passes through described the in user account
In the case that the log duration that one browser end logs in the streaming media server reaches preset duration, by first browser
The request sent is held, first browser end is installed on the first view networked devices;
It is requested according to the dynamic key, the first browser end of Xiang Suoshu sends the dynamic key;
Interact depending on networking data with first browser end based on the dynamic key;
The new dynamic key request that first browser end is sent is received, the new dynamic key is requested as in institute
State the log duration after user account is reset by the log duration that first browser end logs in the streaming media server
In the case where reaching the preset duration, by the request of first browser end transmission;
According to the new dynamic key request, the first browser end of Xiang Suoshu sends the new dynamic key;
Interact depending on networking data with first browser end based on the new dynamic key.
6. according to the method described in claim 5, it is characterized in that, the method also includes:
When receiving the logging request that user account is sent by the second browser end, the first browser end of Xiang Suoshu sends phase
The login authorization requests answered, second browser end are installed on the second view networked devices;
It receives the dynamic key that first browser end is sent and updates request, the dynamic key updates request not allow
In the case that the user account is logged in by second browser end, it is close that the request of Xiang Suoshu streaming media server updates dynamic
The request of key;
It updates and requests in response to the dynamic key, the first browser end of Xiang Suoshu sends the updated dynamic key;
Interact depending on networking data with first browser end based on the updated dynamic key.
7. according to the method described in claim 6, it is characterized in that, being awarded sending corresponding log in first browser end
After power request, the method also includes:
The dynamic key forwarding instruction that first browser end is sent is received, the dynamic key forwarding instructs allowing institute
In the case where user account is stated by second browser end login, indicate the streaming media server to second browsing
The instruction of device end transmission dynamic key;
It forwards and instructs in response to the dynamic key, the second browser end of Xiang Suoshu sends dynamic key, so that the Streaming Media
Server is based on the dynamic key and interact depending on networking data with second browser end.
8. a kind of device of anti-rogue attacks, which is characterized in that described device is applied to the first browser end, first browsing
Device end is installed on the first view networked devices, and described device includes:
Duration module is determined, when for determining login of the user account by first browser end login streaming media server
It is long;
Send dynamic key request module, in the case where the log duration reaches preset duration, Xiang Suoshu Streaming Media
Server sends dynamic key request, and dynamic key request is for the streaming media server request dynamic key, institute
It states dynamic key and carries out the encryption key interacted depending on networking data with the streaming media server for first browser end;
Dynamic key module is received, the dynamic key sent for receiving the streaming media server;
Interaction resetting module, for interact depending on networking data with the streaming media server based on the dynamic key, and
Reset the log duration;
New key interactive module, in the case where reaching the preset duration for log duration after a reset, to the stream matchmaker
Body server sends new dynamic key request, with the new dynamic key and the stream sent based on the streaming media server
Media server carries out view networking data interaction.
9. a kind of device of anti-rogue attacks, which is characterized in that described device is applied to streaming media server, described device packet
It includes:
First end request module is received, for receiving the dynamic key request of the first browser end transmission, the dynamic key is asked
It asks to reach preset duration by the log duration that first browser end logs in the streaming media server in user account
In the case where, the request sent by first browser end, first browser end is installed on the first view networked devices;
First end cipher key module is sent, for requesting according to the dynamic key, the first browser end of Xiang Suoshu sends described dynamic
State key;
Data interaction module, for interact depending on networking data with first browser end based on the dynamic key;
Cipher key module after resetting is received, the new dynamic key request sent for receiving first browser end, institute
New dynamic key request is stated to log in the streaming media server by first browser end in the user account
In the case that log duration after log duration resetting reaches the preset duration, asked by what first browser end was sent
It asks;
New key module is sent, for requesting according to the new dynamic key, the first browser end of Xiang Suoshu sends described new
Dynamic key;
First end interactive module is handed over for carrying out view networking data based on the new dynamic key and first browser end
Mutually.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor
The step in method as claimed in claim 1 is realized when execution.
11. a kind of electronic equipment including memory, processor and stores the calculating that can be run on a memory and on a processor
Machine program, which is characterized in that the step of processor realizes method as claimed in claim 1 when executing.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910512044.5A CN110381021B (en) | 2019-06-13 | 2019-06-13 | Method and device for preventing illegal attack, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910512044.5A CN110381021B (en) | 2019-06-13 | 2019-06-13 | Method and device for preventing illegal attack, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110381021A true CN110381021A (en) | 2019-10-25 |
CN110381021B CN110381021B (en) | 2021-04-20 |
Family
ID=68250283
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910512044.5A Active CN110381021B (en) | 2019-06-13 | 2019-06-13 | Method and device for preventing illegal attack, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110381021B (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101702725A (en) * | 2009-11-12 | 2010-05-05 | 清华大学 | System, method and device for transmitting streaming media data |
US8429081B1 (en) * | 2004-02-12 | 2013-04-23 | Novell, Inc. | Techniques for securely delivering media data |
CN106161383A (en) * | 2015-04-15 | 2016-11-23 | 北京视联动力国际信息技术有限公司 | A kind of multimedia data encryption, the method and device of deciphering |
CN106850699A (en) * | 2017-04-10 | 2017-06-13 | 中国工商银行股份有限公司 | A kind of mobile terminal login authentication method and system |
CN109743170A (en) * | 2018-11-30 | 2019-05-10 | 视联动力信息技术股份有限公司 | A kind of Streaming Media logs in and the method and apparatus of data transmission encryption |
-
2019
- 2019-06-13 CN CN201910512044.5A patent/CN110381021B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8429081B1 (en) * | 2004-02-12 | 2013-04-23 | Novell, Inc. | Techniques for securely delivering media data |
CN101702725A (en) * | 2009-11-12 | 2010-05-05 | 清华大学 | System, method and device for transmitting streaming media data |
CN106161383A (en) * | 2015-04-15 | 2016-11-23 | 北京视联动力国际信息技术有限公司 | A kind of multimedia data encryption, the method and device of deciphering |
CN106850699A (en) * | 2017-04-10 | 2017-06-13 | 中国工商银行股份有限公司 | A kind of mobile terminal login authentication method and system |
CN109743170A (en) * | 2018-11-30 | 2019-05-10 | 视联动力信息技术股份有限公司 | A kind of Streaming Media logs in and the method and apparatus of data transmission encryption |
Also Published As
Publication number | Publication date |
---|---|
CN110381021B (en) | 2021-04-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108023910B (en) | A kind of terminal monitoring method and system based on view networking | |
CN108075920B (en) | A kind of management method and system regarding networked terminals | |
CN108965912B (en) | A kind of method, client and the server of video data processing | |
CN109120946A (en) | The method and apparatus for watching live streaming | |
CN108023858B (en) | A kind of view networking network management safety certifying method and its system | |
CN108881361A (en) | A kind of data push method and device based on view networking | |
CN110062195A (en) | A kind of video conference cut-in method and system | |
CN110138725A (en) | A kind of method for interchanging data and security gateway | |
CN109787873A (en) | A kind of method and apparatus of multi-to-multi incoming communication | |
CN109462594A (en) | A kind of data processing method and system based on view networking | |
CN109194915A (en) | A kind of processing method and system of video data | |
CN110324678A (en) | Method, apparatus, electronic equipment and the readable storage medium storing program for executing of transmitting, monitoring resource | |
CN109905627A (en) | A kind of method and apparatus of audio/video flow data recording | |
CN109151519A (en) | A kind of configuration distribution method and system based on view networking | |
CN110536178A (en) | A kind of live-broadcast control method and system | |
CN108989850A (en) | A kind of video playing control method and control system | |
CN108881791B (en) | A kind of conference control method and Conference control device based on view networking | |
CN110012063A (en) | A kind of processing method and system of data packet | |
CN110445759A (en) | A kind of electronic whiteboard sharing method and device | |
CN109376507A (en) | A kind of data safety control method and system | |
CN110278244A (en) | A kind of method of network entry and view networked terminals based on view networking | |
CN109586851A (en) | Data transmission method and device based on view networking | |
CN109640194A (en) | A kind of method and apparatus that terminal authorization is obtained by two dimensional code based on view networking | |
CN110392289A (en) | A kind of processing method and system of account | |
CN109361546A (en) | A kind of program method for early warning and device based on view networking |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |