CN110381375B - Method for determining data embezzlement, client and server - Google Patents

Method for determining data embezzlement, client and server Download PDF

Info

Publication number
CN110381375B
CN110381375B CN201810333817.9A CN201810333817A CN110381375B CN 110381375 B CN110381375 B CN 110381375B CN 201810333817 A CN201810333817 A CN 201810333817A CN 110381375 B CN110381375 B CN 110381375B
Authority
CN
China
Prior art keywords
information
data
client
video stream
video
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810333817.9A
Other languages
Chinese (zh)
Other versions
CN110381375A (en
Inventor
周志刚
张文明
陈少杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201810333817.9A priority Critical patent/CN110381375B/en
Publication of CN110381375A publication Critical patent/CN110381375A/en
Application granted granted Critical
Publication of CN110381375B publication Critical patent/CN110381375B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44204Monitoring of content usage, e.g. the number of times a movie has been viewed, copied or the amount which has been watched
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44213Monitoring of end-user related data
    • H04N21/44222Analytics of user selections, e.g. selection of programs or purchase activity

Abstract

The embodiment of the application discloses a method for determining embezzlement data, which is used for determining embezzlement data. The method in the embodiment of the application comprises the following steps: the client responds to the operation of the user and generates an access request; the client records access data according to the access request, wherein the access data comprises room information, video list information and a video watching address; and the client sends the access data to a server, and the access data is used for the server to determine embezzlement data.

Description

Method for determining data embezzlement, client and server
Technical Field
The present application relates to the field of information processing, and in particular, to a method, a client, and a server for determining data to be embezzled.
Background
At present, short videos are increasingly popular with people. Some video websites also provide video uploading and playing functions. The video shooter or editor can provide short video content and place the short video content on the video website, and the video website can award certain points to the video provider according to the viewing times or sharing times of the uploaded video. The more people watch the video content, the more the video content is watched, or the sharing times indicate that the video content is more popular with the audiences, so that the corresponding rewards of the video website are more. However, many illegal hackers steal the video watching times or sharing times to forge the false watching times or sharing times so as to obtain income, and certain loss is caused to the video website.
Disclosure of Invention
The embodiment of the application provides a method for determining embezzlement data, a client and a server, which are used for determining embezzlement data.
In view of this, a first aspect of the embodiments of the present application provides a method for determining pirated data, which may include:
the client responds to the operation of the user and generates an access request;
the client records access data according to the access request, wherein the access data comprises room information, video list information and a video watching address;
the client sends the access data to the server, and the access data is used for the server to determine embezzlement data.
Optionally, in some embodiments of the present application, the method may further include:
the client acquires user behavior data, equipment information and equipment IP address information;
the client encrypts the user behavior data, the equipment information and the equipment IP address information;
and the client sends the encrypted user behavior data, the equipment information and the equipment IP address information to the server.
Optionally, in some embodiments of the present application, the method may further include:
the client records the unique identifier of the equipment and the viewing record information;
the client sends the unique device identification and the viewing record information to the server, and the unique device identification and the viewing record information are used for the server to determine the pirate data.
A second aspect of the embodiments of the present application provides a method for determining pirated data, which may include:
the server receives access data sent by the client, wherein the access data comprises room information, video list information and a video watching address;
and the server determines to steal the data according to the access data.
Optionally, in some embodiments of the present application, the method may further include:
the server receives the encrypted user behavior data, the equipment information and the equipment IP address information sent by the client;
and the server determines the embezzled data according to the encrypted user behavior data, the encrypted equipment information and the encrypted equipment IP address information.
Optionally, in some embodiments of the present application, the method may further include:
the server records the total amount of downloaded video stream data;
and if the total amount is not within the preset range, the server determines the video stream data as embezzled data.
Optionally, in some embodiments of the present application, the method may further include:
the server receives the unique equipment identifier and the viewing record information sent by the client;
and the server determines embezzlement data according to the unique identifier of the equipment and the viewing record information.
A third aspect of the embodiments of the present application provides a client, which may include:
the receiving module is used for responding to the operation of a user and generating an access request;
the processing module is used for recording access data according to the access request, wherein the access data comprises room information, video list information and a video watching address;
and the sending module is used for sending the access data to the server, and the access data is used for the server to determine embezzlement data.
Alternatively, in some embodiments of the present application,
the processing module is also used for acquiring user behavior data, equipment information and equipment IP address information; encrypting the user behavior data, the equipment information and the equipment IP address information;
the sending module is further configured to send the encrypted user behavior data, the device information, and the device IP address information to the server.
Alternatively, in some embodiments of the present application,
the processing module is also used for recording the unique identifier of the equipment and watching the recorded information;
the sending module is further configured to send the unique device identifier and the viewing record information to the server, where the unique device identifier and the viewing record information are used by the server to determine to embezzle data.
A fourth aspect of the embodiments of the present application provides a server, which may include:
the receiving module is used for receiving access data sent by the client, and the access data comprises room information, video list information and a video watching address;
and the processing module is used for determining the embezzlement data according to the access data.
Alternatively, in some embodiments of the present application,
the receiving module is also used for receiving the encrypted user behavior data, the equipment information and the equipment IP address information sent by the client;
the processing module is further configured to determine the pirate data according to the encrypted user behavior data, the encrypted device information, and the encrypted device IP address information.
Optionally, in some embodiments of the present application, the method may further include:
the receiving module is also used for receiving the unique equipment identifier and the viewing record information sent by the client;
the processing module is also used for determining embezzlement data according to the unique identifier of the equipment and the viewing record information.
A fifth aspect of the present invention provides an electronic device, comprising a memory, and a processor, wherein the processor is configured to implement the steps of the method for determining pirate data according to any one of the above when executing a computer management-like program stored in the memory.
A sixth aspect of the present invention provides a computer-readable storage medium, on which a computer management class program is stored, the computer management class program, when executed by a processor, implementing the steps of the method for determining pirate data according to any one of the above.
It should be noted that the technical solutions of the present application, which are essential or contributing to the prior art, or all or part of the technical solutions, can be embodied in the form of a software product stored in a storage medium for storing computer software instructions for the client or the server, which contains a program designed for the client or the server to execute the above aspects.
The storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
According to the technical scheme, the embodiment of the application has the following advantages:
in the embodiment of the application, the client responds to the operation of a user to generate an access request; the client records access data according to the access request, wherein the access data comprises room information, video list information and a video watching address; and the client sends the access data to a server, and the access data is used for the server to determine embezzlement data. If the server receives this access data, it can be determined that the access data of the user's access request is not spoofed data. A method of determining ripped data is provided.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the following briefly introduces the embodiments and the drawings used in the description of the prior art, and obviously, the drawings in the following description are only some embodiments of the present application, and other drawings can be obtained according to the drawings.
FIG. 1 is a schematic diagram of an embodiment of a method for determining pirated data in an embodiment of the present application;
FIG. 2 is a schematic diagram of an embodiment of a client in an embodiment of the present application;
FIG. 3 is a schematic diagram of an embodiment of a server in an embodiment of the present application;
FIG. 4 is a schematic diagram of another embodiment of a client in the embodiment of the present application;
FIG. 5 is a schematic diagram of an embodiment of a computer-readable storage medium in an embodiment of the present application;
FIG. 6 is a schematic diagram of another embodiment of a server in the embodiment of the present application;
fig. 7 is a schematic diagram of an embodiment of a computer-readable storage medium in an embodiment of the present application.
Detailed Description
The embodiment of the application provides a method for determining embezzlement data, a video website and a server, which are used for determining embezzlement data.
For a person skilled in the art to better understand the present application, the technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. The embodiments in the present application shall fall within the protection scope of the present application.
In response to the above-identified deficiencies in the art or needs for improvements, the present invention provides a method for determining pirate data to verify viewing of short video. I.e. to prevent some hackers from misappropriating the number of plays or views of the video.
The present invention identifies behavior in determining a swipe from a number of perspectives. Wherein the invention is also applicable to commonly used anti-brush strategies. Firstly, user behavior operation information exists for normally watching a short video, and short video playing page operation is entered, wherein the short video playing page operation comprises information such as a clicked short video list page and watching duration records. Meanwhile, for the watching user, the viewer device unique Identification (ID) is counted, and the device unique ID can distinguish whether the viewer device unique Identification (ID) is from one device or a plurality of devices. Meanwhile, Internet Protocol (IP) addresses of the same video viewer device (i.e., client) are counted, and a large number of users from the same IP address are suspicious users. The client collects user behavior operations of a user in the whole video website, wherein the user behavior operations comprise page click paths, button operations, mouse clicks, keyboard operations and the like. The data is reported to a big data background of a video website, namely a big data server, and the user behavior is subjected to portrait so as to search for the embezzled suspicious user. Thereby subtracting the suspicious user from the viewing record count of the portion of users to reduce the behavior of the pirate brushing.
The following examples further illustrate the practice of the present invention. The method comprises the following steps:
101. the client collects user behavior data.
The user behavior data may include, but is not limited to, user behavior data of page information and user behavior data of button information. That is, the client collecting the user behavior data may include: the method comprises the steps that a client side collects user behavior data of page information added to a video website; or, the client adds the collection of user behavior data of button information to the video website.
(1) And collecting user behavior data of page information of the video website. For the video website in the invention, firstly, the user behavior data of the page information is collected at the user equipment (also called terminal). The user behavior data of the page information may include information such as a page click operation of a user, a sliding operation on a page, a mouse moving operation, a keyboard operation, and the like, and may also include a page retention time. Or, when the user watches the video, the user clicks the button operation information of the page, records the clicking behavior of the page button, and also records the information such as the clicked coordinate position. Or, recording jump operation information of each page during page operation.
A page identification may be defined for each page so that the page viewed by the viewer can be distinguished, as well as from which page to jump. The collection of the user behavior data of the page information can be reported to a server of a video website background, and the server stores the data so as to facilitate subsequent data analysis. Meanwhile, in order to prevent the reported information from being cracked and forged by hackers, the invention classifies the user behavior data of the page information and can encrypt the user behavior data of the page information, thereby improving the safety of the data and preventing the reported information from being forged easily.
It is assumed that a unique identification ID can be assigned to each page.
Then, the encryption method for reporting the user behavior data of the page information may be as follows:
Md5key=Md5.Create(timestamp+ID);
first, the video website may generate a data-encrypted key value, which is then calculated from the page ID and the current timestamp to obtain an Md5 value. Therefore, the key value is different for different pages at different times, so that when the user behavior data of the page information is encrypted, even if the user behavior data of the same original page information is encrypted, the user behavior data of the encrypted final page information is always changed. Therefore, the data security can be greatly improved.
EncryptData=Tea.Encrypt(Md5key,data);
In the invention, a Tea encryption algorithm can be adopted to encrypt the user behavior data of the page information, and an encryption interface can be Tea.
Wherein, the Md5key is the key value used by the encryption calculated before.
And the data is the user behavior data of the acquired page information and packaged together.
And finally, when the user behavior data of the page information is reported, the encrypted EncryptData, the timestamp and the current page ID value are reported.
After the big data server, which may also be referred to as a server for short, acquires the encrypted data, the same method may be used to decrypt the encrypted data to obtain the user behavior data of the original page information.
(2) And collecting user behavior data of button information for the video website.
For each page played on the video website, the page has some indication information of the button, and the client side in the invention can collect the operation information of the button, button clicking events, button clicking positions and the like of the user. Typically, for a normal user, the button click may be at a different screen coordinate each time, whereas for a script-swiped hacker the button position is likely to be a fixed exact position. The client side collects the user behavior data of the button information and reports the user behavior data to the server, and the server can analyze the user behavior by utilizing the user behavior data of the button information and identify the behavior of script operation.
It can be understood that the client terminal can classify the user behavior data of the button information collected by the video website, and can encrypt the user behavior data of the button information, so that the security of the data is improved, and the reported information is not easy to forge. Specifically, reference may be made to the encryption method in (1) above, which is not described herein again.
102. The client sends the user behavior data to the server.
That is, the collection of the user behavior data of the client page information of the video website and the report of the encrypted data can be completed through the steps 101 and 102. And the collection of user behavior data of the client button information of the video website and the report of the encrypted data can also be finished.
103. The client collects the device information.
For the video of the video website watched by the user, the client side in the invention can also collect the relevant information of the equipment, also can be referred to as equipment information for short. The device-related information may include a device type, wherein the device type is a global wide area network (ww an) or world wide WEB (WEB) terminal, a Personal Computer (PC) client, an Android device, an IOS device, and the like. For each device, the client collects information including a device type, a unique device ID, device hardware, and the like, as much as possible, such as a Central Processing Unit (CPU) model, a serial number, and the like.
It should be noted that, the client encrypts the acquired device information by using the above encryption method, and reports the encrypted device information to the server, and the specific encryption process may refer to the description in the foregoing, which is not described herein again.
104. The client sends the device information to the server.
That is, the collection and report of the device information of the video watched by the user can be completed through steps 103 and 104.
105. The client collects the IP address information of the equipment.
For a large number of viewing times, it is likely that the video is continuously requested to be viewed on the same device. Then, there are a large number of behaviors that the same IP address is used for watching, and then the IP address of the device reported by the client is likely to help the big data query to inquire the condition of a large number of IP aggregates, and is the IP address that is suspicious to watch.
106. The client sends the device IP address information to the server.
That is, the collection and report of the IP address information of the device are completed through steps 105 and 106.
107. The client records the relevant data accessed by the interface.
The client records the relevant data accessed by the interface, and may include: the client responds to the operation of the user and generates an access request; and the client records access data according to the access request, wherein the access data comprises room information, video list information and a video watching address.
For example, for a user watching a video normally, the client requests the relevant data by accessing the interface of the video website. For example, room information is acquired, video list information is acquired, a video viewing address is acquired, and the like. Then, for the access of the interfaces, the client records the access information of each user, so that the behavior of the user can be correlated when the access information is reported to the big data server for analysis. The absence of such data may indicate an illegal hacking act.
108. The client sends the relevant data accessed by the interface to the server.
I.e. the recording of the information accessed by the video web site interface is completed by steps 107 and 108.
109. The server adds authentication to the video stream address.
For all users watching the video to see the video, the users must request the watching address of the video, so as to pull the video stream through the watching address of the video for playing. The invention can add authentication algorithm to the request of the video stream address to improve the threshold of stealing video watching times of non-platform users. Normal users will generally have an authentication record of the requested video stream address, i.e. the authentication result is correct. And if the record is not authenticated, the record can be regarded as a record of embezzlement. Meanwhile, for a Content Delivery Network (CDN) of a video stream server, a video address is generated once and can be used once, the same video stream address is limited by viewing duration, and the video stream address is valid for how many minutes.
The specific authentication algorithm is as follows:
when a client requests a video stream watching address, the client carries a token of a client login video website, a room number ROomid of the client, current timestamp information time, a device unique deviceID of the client and user unique uid information of the client. And calculating an authentication key value through the information, wherein the key value can be uploaded to a server, the server calculates whether the authentication value of the client is legal or not according to the information reported by the client, if the authentication value is legal, a correct viewing address is issued, and otherwise, the request is rejected.
The specific implementation mode is as follows:
Key=Md5.create(token+roomid+time+deviceID+uid);
the MD5 value is calculated by concatenating the information to obtain the key value for authentication.
The client requests the video stream viewing address to carry the key value, and similarly, the server also calculates the key value in the same way, so as to judge whether the key value of the client is legal or not.
Namely, the acquisition and the report of the IP address information of the audience are finished through the step.
110. The client records the device unique identification.
For the client viewed by the user, the invention records the viewing record and the unique equipment identifier of the user at the client. First, a device unique ID is generated, stored on the client, and the ID of the video and the viewing time and duration are recorded for the video being viewed. If the same client side performs embezzlement, multiple records which are watched at the same time are generated, and the data is reported to big data for analysis, so that the embezzlement behavior can be identified.
111. And the client sends the unique equipment identification to the server.
That is, recording of the user viewing data and the device unique ID information to the viewing device is completed through steps 110 and 111.
112. And recording the downloading of the watching video code rate of the client at the server.
For a normal audience to watch a video, a video stream is pulled from a Content Delivery Network (CDN) server of a corresponding video website, the CDN records video stream data of each line, the watching duration of the CDN is calculated, the total downloaded video stream data of the watching duration can be calculated according to the watching duration and the watching resolution, and the calculating method is obtained by multiplying the duration by a code rate.
Then, the CDN server calculates, for each viewer who views the record, the total amount of the normal downloaded video stream data thereof, and is compatible with an error within a certain range, and then viewers who are not within this range can be regarded as all abnormal views, so that an illegal view record can be identified from the video stream download data of the CDN server.
Namely, the action of downloading data from the CDN video stream to identify the user to swipe the watching record is completed through the step.
113. And the server analyzes data statistics and identifies the user behavior for embezzlement.
For a large amount of data reported by the client, the big data server can analyze the data, identify the behavior of embezzlement and search abnormal data by comparing the aggregation of the data.
For example, if a large amount of viewing behavior comes from the same IP address, it can be determined that the number of views of the IP address belongs to the spoofed data, and the server can subtract the number of views at the IP address.
For example, a large amount of user behavior data is collected and reported, or data is reported abnormally.
Namely, the step is used for analyzing the data by the big data and searching for abnormal embezzlement behaviors.
It should be noted that, in the embodiment of the present application, the steps 101-. Also, the timing of steps 101, 103, 105, and 110 is not limited, and the timing of steps 102, 104, 106, and 111 is not limited.
The above describes an embodiment of the method in the present invention, and the following describes a client and a server in the present invention separately.
As shown in fig. 2, fig. 2 is a schematic diagram of an embodiment of a client in the present invention, which may include:
a receiving module 201, configured to generate an access request in response to an operation of a user;
the processing module 202 is configured to record access data according to the access request, where the access data includes room information, video list information, and a video viewing address;
and the sending module 203 is used for sending the access data to the server, and the access data is used for the server to determine the data embezzlement.
Alternatively, in some embodiments of the present application,
the processing module 202 is further configured to collect user behavior data, device information, and device IP address information; encrypting user behavior data, equipment information and equipment IP address information;
the sending module 203 is further configured to send the encrypted user behavior data, the device information, and the device IP address information to the server.
Alternatively, in some embodiments of the present application,
the processing module 202 is further configured to record the unique device identifier and view the recording information;
the sending module 203 is further configured to send the device unique identifier and the viewing record information to the server, where the device unique identifier and the viewing record information are used by the server to determine the pirated data.
As shown in fig. 3, fig. 3 is a schematic diagram of an embodiment of a client in the present invention, which may include:
the receiving module 301 is configured to receive access data sent by a client, where the access data includes room information, video list information, and a video viewing address;
and the processing module 302 is configured to determine to steal the data according to the access data.
Alternatively, in some embodiments of the present application,
the receiving module 301 is further configured to receive encrypted user behavior data, device information, and device IP address information sent by the client;
the processing module 302 is further configured to determine to embezzle the data according to the encrypted user behavior data, the encrypted device information, and the encrypted device IP address information.
Alternatively, in some embodiments of the present application,
the receiving module 301 is further configured to receive the device unique identifier and the viewing record information sent by the client;
the processing module 302 is further configured to determine to steal the data according to the unique device identifier and the viewing record information.
Referring to fig. 4, fig. 4 is a schematic diagram illustrating an embodiment of a client according to the present invention.
As shown in fig. 4, an embodiment of the present invention provides a client, which includes a memory 410, a processor 420, and a computer program 411 stored on the memory 420 and running on the processor 420, and when the processor 420 executes the computer program 411, the following steps may be implemented:
responding to the operation of a user and generating an access request;
recording access data according to the access request, wherein the access data comprises room information, video list information and a video watching address;
and sending the access data to a server, wherein the access data is used for determining embezzlement data by the server.
Optionally, in some embodiments of the present application, the processor 420, when executing the computer program 411, may further implement the following steps:
collecting user behavior data, equipment information and equipment IP address information;
encrypting the user behavior data, the equipment information and the equipment IP address information;
and sending the encrypted user behavior data, the encrypted equipment information and the encrypted equipment IP address information to the server.
In the detailed implementation process, when the processor 420 executes the computer program 411, any of the embodiments corresponding to fig. 1 may be implemented.
Since the client described in this embodiment is a device used for implementing a method for determining to steal data in the embodiment of the present invention, based on the method described in the embodiment of the present invention, those skilled in the art can understand a specific implementation manner of the client in this embodiment and various variations thereof, so that how to implement the method in the embodiment of the present invention by the client is not described in detail herein, and as long as the device used for implementing the method in the embodiment of the present invention by the client is included in the scope to be protected by the present invention.
Referring to fig. 5, fig. 5 is a schematic diagram illustrating an embodiment of a computer-readable storage medium according to the present invention.
As shown in fig. 5, the present embodiment provides a computer-readable storage medium, on which a computer program 511 is stored, and the computer program 511, when executed by a processor, can implement the following steps:
responding to the operation of a user and generating an access request;
recording access data according to the access request, wherein the access data comprises room information, video list information and a video watching address;
and sending the access data to a server, wherein the access data is used for determining embezzlement data by the server.
Optionally, in some embodiments of the present application, the computer program 511, when executed by the processor, may further implement the following steps:
collecting user behavior data, equipment information and equipment IP address information;
encrypting the user behavior data, the equipment information and the equipment IP address information;
and sending the encrypted user behavior data, the encrypted equipment information and the encrypted equipment IP address information to the server.
Referring to fig. 6, fig. 6 is a schematic diagram of an embodiment of a server according to the present invention.
As shown in fig. 6, an embodiment of the present invention provides a server, which includes a memory 610, a processor 620, and a computer program 611 stored in the memory 620 and operable on the processor 620, and when the processor 620 executes the computer program 611, the following steps can be implemented:
receiving access data sent by a client, wherein the access data comprises room information, video list information and a video watching address;
and determining the data stolen and brushed according to the access data.
Optionally, in some embodiments of the present application, the processor 620 may further implement the following steps when executing the computer program 611:
receiving encrypted user behavior data, equipment information and equipment IP address information sent by the client;
and determining the embezzled data according to the encrypted user behavior data, the encrypted equipment information and the encrypted equipment IP address information.
In this embodiment, when the processor 620 executes the computer program 611, any of the embodiments corresponding to fig. 1 may be implemented.
Since the client described in this embodiment is a device used in implementing a method for determining to steal data in the embodiment of the present invention, based on the method described in the embodiment of the present invention, those skilled in the art can understand the specific implementation manner of the client in this embodiment and various variations thereof, so that how to implement the method in the embodiment of the present invention by the client is not described in detail herein, and as long as the device used in implementing the method in the embodiment of the present invention by the person skilled in the art belongs to the scope of the present invention to be protected.
Referring to fig. 7, fig. 7 is a schematic diagram illustrating an embodiment of a computer-readable storage medium according to the present invention.
As shown in fig. 7, the present embodiment provides a computer-readable storage medium, on which a computer program 711 is stored, which computer program 711, when executed by a processor, may implement the following steps:
receiving access data sent by a client, wherein the access data comprises room information, video list information and a video watching address;
and determining the data stolen and brushed according to the access data.
Optionally, in some embodiments of the present application, the computer program 711 when executed by the processor may further implement the following steps:
receiving encrypted user behavior data, equipment information and equipment IP address information sent by the client;
and determining the embezzled data according to the encrypted user behavior data, the encrypted equipment information and the encrypted equipment IP address information.
It should be noted that, in the foregoing embodiments, the description of each embodiment has an emphasis, and reference may be made to the related description of other embodiments for a part that is not described in detail in a certain embodiment.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described systems, apparatuses and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.

Claims (9)

1. A method of determining ripped data, comprising:
the client responds to the operation of the user and generates an access request;
the client records access data according to the access request, wherein the access data comprises room information, video list information and a video watching address;
the client acquires user behavior data, wherein the user behavior data comprises coordinate position information of button operation information of a click page when a user watches a video;
the client encrypts the user behavior data to obtain encrypted user behavior data;
the client generates a video stream authentication value based on video stream information, wherein the video stream information comprises video website information, target room number information, timestamp information, client equipment information and user ID information;
the client pulls the video stream to the server so that the server obtains the watching time length and the resolution of the client through the video stream to obtain the total amount of video stream data;
the client sends the access data, the encrypted user behavior data and the video stream authentication value to the server;
and the access data, the encrypted user behavior data, the video stream authentication value and the total amount of the video stream data are used for the server to determine embezzlement data.
2. The method of claim 1, further comprising:
the client acquires equipment information and equipment IP address information;
the client encrypts the equipment information and the equipment IP address information;
and the client sends the encrypted equipment information and the encrypted equipment IP address information to the server.
3. A method of determining ripped data, comprising:
the server receives access data, encrypted user behavior data and a video stream authentication value sent by a client, wherein the access data comprises room information, video list information and a video watching address, the encrypted user behavior data comprises coordinate position information of button operation information of a click page when a user watches a video, the video stream authentication value is generated based on video stream information, and the video stream information comprises video website information, target room number information, timestamp information, client equipment information and user ID information;
the server acquires the watching duration and the resolution of the client according to the video stream to acquire the total amount of the video stream data;
and the server determines embezzlement data according to the access data, the encrypted user behavior data, the video stream authentication value and the total amount of the video stream data.
4. The method of claim 3, further comprising:
the server receives the encrypted equipment information and the encrypted equipment IP address information sent by the client;
and the server determines the embezzled data according to the encrypted equipment information and the encrypted equipment IP address information.
5. A client, comprising:
the receiving module is used for responding to the operation of a user and generating an access request;
the processing module is used for recording access data according to the access request and acquiring user behavior data, wherein the access data comprises room information, video list information and a video watching address, and the user behavior data comprises coordinate position information of button operation information of a click page when a user watches a video; the client encrypts the user behavior data to obtain encrypted user behavior data; the client generates a video stream authentication value based on video stream information, wherein the video stream information comprises video website information, target room number information, timestamp information, client equipment information and user ID information;
the client pulls the video stream to the server so that the server obtains the watching time length and the resolution of the client through the video stream to obtain the total amount of video stream data;
and the sending module is used for sending the access data, the encrypted user behavior data and the video stream authentication value to the server by the client, wherein the access data, the encrypted user behavior data, the video stream authentication value and the total amount of the video stream data are used for determining embezzlement data by the server.
6. The client of claim 5,
the processing module is also used for acquiring equipment information and equipment IP address information; encrypting the device information and the device IP address information;
the sending module is further configured to send the encrypted device information and the encrypted device IP address information to the server.
7. A server, comprising:
the system comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving access data, encrypted user behavior data and a video stream authentication value sent by a client, the access data comprises room information, video list information and a video watching address, the encrypted user behavior data comprises coordinate position information of button operation information of a click page when a user watches a video, the video stream authentication value is generated based on video stream information, and the video stream information comprises video website information, target room number information, timestamp information, client equipment information and user ID information;
the processing module is used for acquiring the watching duration and the resolution of the client according to the video stream so as to obtain the total amount of the video stream data; and the server determines embezzlement data according to the access data, the encrypted user behavior data, the video stream authentication value and the total amount of the video stream data.
8. The server according to claim 7,
the receiving module is further configured to receive the encrypted device information and the device IP address information sent by the client;
and the processing module is also used for determining the embezzlement data according to the encrypted equipment information and the encrypted equipment IP address information.
9. A computer-readable storage medium comprising instructions that, when executed on a computer, cause the computer to perform the method of any of claims 1-4.
CN201810333817.9A 2018-04-13 2018-04-13 Method for determining data embezzlement, client and server Active CN110381375B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810333817.9A CN110381375B (en) 2018-04-13 2018-04-13 Method for determining data embezzlement, client and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810333817.9A CN110381375B (en) 2018-04-13 2018-04-13 Method for determining data embezzlement, client and server

Publications (2)

Publication Number Publication Date
CN110381375A CN110381375A (en) 2019-10-25
CN110381375B true CN110381375B (en) 2022-06-21

Family

ID=68243739

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810333817.9A Active CN110381375B (en) 2018-04-13 2018-04-13 Method for determining data embezzlement, client and server

Country Status (1)

Country Link
CN (1) CN110381375B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113268690B (en) * 2021-04-15 2023-08-29 微梦创科网络科技(中国)有限公司 Method and system for safely filtering website short video playing information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004328747A (en) * 2003-04-25 2004-11-18 Marktek Inc Method for watermarking video and digital video recording apparatus using the method
CN107454441A (en) * 2017-06-30 2017-12-08 武汉斗鱼网络科技有限公司 A kind of method for detecting direct broadcasting room brush popularity behavior and live Platform Server
CN107528855A (en) * 2017-09-26 2017-12-29 武汉斗鱼网络科技有限公司 A kind of data verification method and server
CN107566200A (en) * 2016-06-30 2018-01-09 阿里巴巴集团控股有限公司 A kind of monitoring method, apparatus and system
CN107613314A (en) * 2017-10-09 2018-01-19 武汉斗鱼网络科技有限公司 A kind of method and device for detecting live middle brush popularity behavior

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080270154A1 (en) * 2007-04-25 2008-10-30 Boris Klots System for scoring click traffic
CN102740143B (en) * 2012-07-03 2014-08-20 合一网络技术(北京)有限公司 Network video ranking list generation system based on user behavior and method thereof
CN103327016B (en) * 2013-06-06 2016-06-22 合一信息技术(北京)有限公司 A kind of computing network Streaming Media exception playback volume the method and system to its correction
CN103593415B (en) * 2013-10-29 2017-08-01 北京国双科技有限公司 The detection method and device of web page access amount cheating
CN104834675B (en) * 2015-04-02 2018-02-23 浪潮集团有限公司 A kind of Query Optimization method based on user behavior analysis
CN106326498A (en) * 2016-10-13 2017-01-11 合网络技术(北京)有限公司 Cheat video identification method and device
CN106603554B (en) * 2016-12-29 2019-11-15 北京奇艺世纪科技有限公司 A kind of anti-cheat method and device of adaptive real time video data
CN107566897B (en) * 2017-07-19 2019-10-15 北京奇艺世纪科技有限公司 A kind of discrimination method, device and the electronic equipment of video brush amount
CN107888623B (en) * 2017-12-19 2020-12-18 湖南机友科技有限公司 Method and device for preventing hijacking of audio and video data streams of live broadcast software

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004328747A (en) * 2003-04-25 2004-11-18 Marktek Inc Method for watermarking video and digital video recording apparatus using the method
CN107566200A (en) * 2016-06-30 2018-01-09 阿里巴巴集团控股有限公司 A kind of monitoring method, apparatus and system
CN107454441A (en) * 2017-06-30 2017-12-08 武汉斗鱼网络科技有限公司 A kind of method for detecting direct broadcasting room brush popularity behavior and live Platform Server
CN107528855A (en) * 2017-09-26 2017-12-29 武汉斗鱼网络科技有限公司 A kind of data verification method and server
CN107613314A (en) * 2017-10-09 2018-01-19 武汉斗鱼网络科技有限公司 A kind of method and device for detecting live middle brush popularity behavior

Also Published As

Publication number Publication date
CN110381375A (en) 2019-10-25

Similar Documents

Publication Publication Date Title
US11055429B2 (en) Key providing method, video playing method, server and client
CN108769749B (en) Method for determining data embezzlement, client and server
CN107454441B (en) A kind of method, live streaming Platform Server and the computer readable storage medium of detection direct broadcasting room brush popularity behavior
Dimopoulos et al. Measuring video QoE from encrypted traffic
US9646140B2 (en) Method and apparatus for protecting online content by detecting noncompliant access patterns
JP2019012528A (en) Methods and apparatus for collecting distributed user information for media impressions and search terms
US8359657B2 (en) Method and apparatus for enabling secure distribution of digital content
CN105450724B (en) Method, apparatus, and tangible computer-readable storage medium for monitoring a media presentation device
CN108737110B (en) Data encryption transmission method and device for preventing replay attack
CN108881966B (en) Information processing method and related equipment
CN110958239B (en) Method and device for verifying access request, storage medium and electronic device
CN108449308B (en) Method and device for identifying malicious resource access
CN113411638A (en) Video file playing processing method and device, electronic equipment and storage medium
CN107124420A (en) Auth method and device
CN108650526B (en) Identification method, computer equipment and storage medium
CN108259183B (en) Attention method, attention device, attention electronic equipment and attention medium
CN110381375B (en) Method for determining data embezzlement, client and server
CN108206961B (en) Method for calculating popularity of live broadcast platform and related equipment
CN108200450B (en) A kind of determination method, apparatus, electronic equipment and medium for paying close attention to legitimacy
US20120210128A1 (en) Information processing apparatus, information processing method and program
CN110380843B (en) Information processing method and related equipment
WO2018176531A1 (en) Video request and video playing method and apparatus
EP4084485A1 (en) Methods, systems, and devices for detecting over-the-top piracy
CN108307246B (en) Method, storage medium, equipment and system for calculating popularity of live broadcast room
CN110381342B (en) Information processing method and related equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant