CN111464837B - Video terminal access verification method and server of online live broadcast system - Google Patents

Video terminal access verification method and server of online live broadcast system Download PDF

Info

Publication number
CN111464837B
CN111464837B CN202010276496.0A CN202010276496A CN111464837B CN 111464837 B CN111464837 B CN 111464837B CN 202010276496 A CN202010276496 A CN 202010276496A CN 111464837 B CN111464837 B CN 111464837B
Authority
CN
China
Prior art keywords
protocol
protocol list
message
list
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
CN202010276496.0A
Other languages
Chinese (zh)
Other versions
CN111464837A (en
Inventor
王晶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Qiucha Network Technology Co ltd
Original Assignee
Hangzhou Qiucha Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Qiucha Network Technology Co ltd filed Critical Hangzhou Qiucha Network Technology Co ltd
Priority to CN202010276496.0A priority Critical patent/CN111464837B/en
Priority to CN202011076062.2A priority patent/CN112235586A/en
Priority to CN202011076049.7A priority patent/CN112243001A/en
Publication of CN111464837A publication Critical patent/CN111464837A/en
Application granted granted Critical
Publication of CN111464837B publication Critical patent/CN111464837B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/61Network streaming of media packets for supporting one-way streaming services, e.g. Internet radio
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2187Live feed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/643Communication protocols

Abstract

The application relates to a video terminal access verification method and a server of an online live broadcast system. By applying the scheme, the access verification can be carried out on the access request of the video terminal to be accessed from the communication protocol layer. And comparing a first protocol list in a target protocol message of the access request with a second protocol list of an original protocol message in a preset database according to the first priority and the second priority, so as to obtain a comparison result of each second protocol list corresponding to each first protocol list. And when a plurality of comparison results corresponding to the second protocol list meet a preset condition, determining whether the video terminal to be accessed passes the access verification according to the verification record of the second protocol list. In this way, the confidence of the comparison result corresponding to each second protocol list can be determined by the preset condition. When the video terminal to be accessed is verified according to the verification record of the second protocol list in the follow-up process, the reliability of verification can be effectively improved.

Description

Video terminal access verification method and server of online live broadcast system
Technical Field
The application relates to the technical field of live video, in particular to a video terminal access verification method and a server of an online live broadcast system.
Background
Live video has become a common entertainment mode in people's life. With the continuous development and optimization of the live broadcast system, the present live broadcast system can support the access of various video terminals. For example, the anchor may access the online live system through a mobile phone, a tablet, or a laptop to perform live broadcasting. The audience can also access the online live broadcast system to watch live broadcast through a mobile phone, a tablet or a notebook computer. However, an online live system usually serves a plurality of anchor terminals and a plurality of audience terminals, and if a certain anchor terminal or audience terminal is attacked by trojan or virus and then accesses the online live system, the whole online live system may be broken down, and other anchor terminals and other audience terminals in the online live system may be invaded by trojan and virus.
Generally, a video terminal (an anchor terminal or a viewer terminal) does not actively detect intrusion behaviors of trojans and viruses, and therefore when the video terminal is accessed to an online live broadcast system, a server of the online live broadcast system is required to perform access verification on the video terminal, so that when the video terminal is verified to be free from trojans and viruses, the video terminal is accessed to the online live broadcast system.
Disclosure of Invention
The application provides a video terminal access verification method and a server of an online live broadcast system, which can perform access verification on a video terminal so as to access the video terminal to the online live broadcast system when the fact that Trojan and virus invasion does not exist in the video terminal is verified.
A video terminal access verification method of an online live broadcast system is applied to a server in the online live broadcast system, the server communicates with a plurality of video terminals in the online live broadcast system through a gateway, and the method at least comprises the following steps:
after receiving an access request of a video terminal to be accessed through a gateway, extracting a target protocol message of the access request, and extracting a first protocol list based on the target protocol message; comparing the first protocol list of the target protocol message with the second protocol list of each original protocol message in a preset database; under the condition that the extracted first protocol lists of the target protocol message are multiple, carrying out hierarchical comparison on each first protocol list and each second protocol list according to a first priority preset by the gateway for each first protocol list of the target protocol message and a second priority preset by the server for each second protocol list, and obtaining a comparison result of each first protocol list corresponding to each second protocol list; when a plurality of comparison results corresponding to the second protocol list meet preset conditions, determining whether the video terminal to be accessed passes access verification according to verification records of list characteristics corresponding to the second protocol list; when it is determined that the video terminal to be accessed passes the access verification, accessing the video terminal to be accessed to the online live broadcast system; and when the video terminal to be accessed is determined not to pass the access verification, sending prompt information carrying the terminal identification of the video terminal to be accessed to the gateway.
A server, comprising: the system comprises a processor, a memory and a network interface, wherein the memory and the network interface are connected with the processor; the network interface is connected with a nonvolatile memory in the server; when the processor is operated, the computer program is called from the nonvolatile memory through the network interface, and the computer program is operated through the memory so as to execute the method.
A readable storage medium applied to a computer is burnt with a computer program, and the computer program realizes the method when running in a memory of a server.
When the video terminal access verification method and the server of the online live broadcast system are applied, the access verification can be performed on the access request of the video terminal to be accessed from the communication protocol level. And comparing a first protocol list in a target protocol message of the access request with a second protocol list of an original protocol message in a preset database according to the first priority and the second priority, so as to obtain a comparison result of each second protocol list corresponding to each first protocol list. And when a plurality of comparison results corresponding to the second protocol list meet a preset condition, determining whether the video terminal to be accessed passes the access verification according to the verification record of the second protocol list. In this way, the confidence of the comparison result corresponding to each second protocol list can be determined by the preset condition. When the video terminal to be accessed is verified according to the verification record of the second protocol list in the follow-up process, the reliability of verification can be effectively improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and together with the description, serve to explain the principles of the application.
Fig. 1 is a communication architecture diagram of an online live broadcast system according to an exemplary embodiment of the present application.
Fig. 2 is a flowchart illustrating a method for access authentication of a video terminal according to an exemplary embodiment of the present application.
Fig. 3 is a block diagram illustrating an embodiment of a video terminal access authentication device according to an exemplary embodiment.
Fig. 4 is a hardware configuration diagram of a server where a video terminal access authentication device of the present application is located.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
To achieve the above object, an embodiment of the present invention provides a method for verifying access to a video terminal of an online live broadcast system, where the method may be applied to the server 100 in fig. 1. In fig. 1, a server 100 is communicatively connected to a plurality of video terminals 200, and a plurality of video terminals 200 are also partially communicatively connected. The server 100 and the plurality of video terminals 200 form an online live system 500. The video terminal 200 may be a broadcaster or a viewer. When the video terminal 200 is a main broadcasting terminal, the video terminal 200 can communicate with a plurality of video terminals 200 as a viewer terminal.
In fig. 1 described above, the server 100 also communicates with the video terminal 400 to be accessed through the gateway 300. Before the terminal 400 to be accessed is not verified, the server 100 indirectly communicates with the terminal 400 to be accessed through the gateway 300, and can intercept trojans or viruses (if any) of the terminal 400 to be accessed through an interception mechanism configured for the gateway 300 in advance, so as to prevent the trojans or viruses carried by the terminal 400 to be accessed from invading the server 100.
On the basis, please refer to fig. 2 in combination, which is a schematic flowchart illustrating steps of a video terminal access verification method of an online live broadcast system according to an embodiment of the present invention, where the method may specifically include the following steps.
Step 110, after receiving an access request of a video terminal to be accessed through a gateway, extracting a target protocol message of the access request, and extracting a first protocol list based on the target protocol message.
In this embodiment, the target protocol packet is a packet related to a communication protocol in the access request.
Step 120, comparing the first protocol list of the target protocol packet with the second protocol list of each original protocol packet in a preset database.
In this embodiment of the application, a second protocol list corresponding to a plurality of original protocol messages and verification records corresponding to list characteristics are stored in the preset database, and the plurality of original protocol messages are protocol messages of a video terminal in the online live broadcast system.
Step 130, when the extracted first protocol lists of the target protocol packet are multiple, comparing the first protocol lists with the second protocol lists in a grading manner according to the first priorities preset by the gateway for the first protocol lists of the target protocol packet and the second priorities preset by the server for the second protocol lists, so as to obtain a comparison result of each first protocol list corresponding to each second protocol list.
In this embodiment, each second protocol list corresponds to a plurality of comparison results.
In particular implementations, for example, the first protocol list is a1, a2, a3, and a4, and the second protocol list is b1, b2, b3, b4, and b 5. For example, the first protocol list is sorted by the first priority into a sequence of a3, a2, a4, or a1, and the second protocol list is sorted by the second priority into a sequence of b4, b1, b3, b2, or b 5.
Further, the hierarchical comparison according to the first priority and the second priority may be specifically implemented by the following examples: compare a3, a2, a4, a1 with b4 in turn, then a3, a2, a4, a1 with b1, and so on. In other words, the above-described hierarchical comparison is performed in descending order of the first priority and the second priority.
Further, the priority is used for representing the degree of influence of the protocol list on the safety of the whole online live broadcast system, and the larger the priority is, the larger the degree of influence of the corresponding protocol list on the safety of the online live broadcast system is. When comparing the protocol lists, the corresponding judgment criteria are more strict. In the present embodiment, a specific comparison process between the first protocol list and the second protocol list will be described in detail later.
Step 140, when the multiple comparison results corresponding to the second protocol list satisfy the preset condition, determining whether the video terminal to be accessed passes the access authentication according to the authentication record of the list characteristics corresponding to the second protocol list.
In the present embodiment, the above example is taken as an example to explain that each second protocol list corresponds to 4 groups of comparison results. The preset condition may be set for the correlation between each two adjacent comparison results, and the confidence of the comparison result corresponding to each second protocol list may be determined by determining whether the comparison result satisfies the preset condition. Therefore, when the video terminal to be accessed is verified according to the verification record of the second protocol list in the follow-up process, the reliability of verification can be effectively improved.
Step 150, when it is determined that the video terminal to be accessed passes the access verification, accessing the video terminal to be accessed to the online live broadcast system; and when the video terminal to be accessed is determined not to pass the access verification, sending prompt information carrying the terminal identification of the video terminal to be accessed to the gateway.
In step 150, the prompting message is used to prompt the gateway to: "the terminal to be accessed fails the access authentication". Therefore, the gateway can intercept and destroy the subsequent request of the video terminal to be accessed, thereby ensuring the safety of the whole online live broadcast system.
It can be seen that, when the above steps 110 to 150 are applied, the access request of the video terminal to be accessed can be access-verified from the communication protocol layer. In the verification process, the comparison result of each second protocol list corresponding to each first protocol list is obtained by comparing the first protocol list in the target protocol message of the access request with the second protocol list of the original protocol message in the preset database according to the size sequence of the first priority and the size sequence of the second priority. And when a plurality of comparison results corresponding to the second protocol list meet preset conditions, determining whether the video terminal to be accessed passes access verification according to verification records of list characteristics corresponding to the second protocol list. In this way, the confidence of the comparison result corresponding to each second protocol list can be determined by judging whether the comparison result meets the preset condition. When the video terminal to be accessed is verified according to the verification record of the second protocol list in the follow-up process, the reliability of verification can be effectively improved.
In a specific implementation, in order to accurately determine and ensure the target protocol packet, in step 110, the step of extracting the target protocol packet of the access request may specifically include the content described in the following steps.
Step 1111, analyzing the access request to obtain a request message sequence corresponding to the access request; the request message sequence includes a plurality of continuous message frames, and each message frame includes frame header information, frame information, and frame tail information.
Step 1112, screening a plurality of groups of first message frame sets from the request message sequence; and each two message frames in each group of first message frame set at least meet the condition that the frame head information is the same or the frame tail information is the same.
Step 1113, screen out the multiple-unit second message frame set from the said multiple-unit first message frame set; wherein all message frames in the second message frame set are continuous message frames.
Step 1114, extracting frame information of each packet frame in each group of second packet frame sets, and combining the extracted frame information according to the sequence of the packet frames in the second packet frame set to obtain packet information corresponding to each group of second packet frame sets.
In this embodiment, the message information may be encoded in a binary character, for example, the message information may be 010011110100101001.
1115, comparing the characteristics of the message information corresponding to each group of second message frame sets with preset information to obtain a similarity value; and determining the message information corresponding to the maximum similarity value as a target protocol message.
In this embodiment, the preset information is used to represent frame information of a protocol packet, and the preset information may be obtained by performing feature extraction, fusion, and restoration on a plurality of different protocol packets.
In a more specific embodiment, the message information corresponding to each group of second message frame sets is compared with preset information to obtain a similarity value, which specifically includes the following contents.
(1) And constructing a first message characteristic vector corresponding to message information corresponding to each group of second message frame sets, and constructing a second message characteristic vector corresponding to preset information, wherein the first message characteristic vector and the second message characteristic vector respectively comprise vector values of a plurality of different message length values.
(2) Extracting first vector description information of the message information corresponding to each group of second message frame sets in each vector value of the first message feature vector, and determining the vector value with the minimum message length value in the second message feature vectors as a target vector value.
(3) And mapping the first vector description information to the target vector value according to a first vector dimension of the first message characteristic vector and a second vector dimension of the second message characteristic vector, obtaining second vector description information from the target vector value, and generating similarity comparison logic between message information corresponding to each group of second message frame sets and the preset information according to the first vector description information and the second vector description information.
(4) And acquiring a reference vector value in the target vector value by taking the second vector description information as reference information, comparing the reference vector value with the vector value of the first vector description information based on the similarity comparison logic, and obtaining a similarity comparison result corresponding to the reference vector value on the basis of the vector value of the first vector description information.
(5) And weighting the obtained message length value of the vector value corresponding to the first vector description information corresponding to each similarity comparison result to the original similarity value represented by each similarity comparison result to obtain the similarity value between the message information corresponding to each group of second message frame sets and the preset information.
It can be understood that, through the steps (1) to (5), the similarity value between the message information corresponding to each group of second message frame sets and the preset information can be accurately determined, and because the preset information is used for representing the frame information of the protocol message, the message information corresponding to the maximum similarity value is determined as the target protocol message, and the target protocol message can be accurately determined and ensured.
In another possible example, in step 130, according to a first priority level preset by the gateway for each first protocol list of the target protocol packet and a second priority level preset by the server for each second protocol list, the first protocol lists and the second protocol lists are compared in a hierarchical manner, so as to obtain a comparison result that each first protocol list corresponds to each second protocol list, which may specifically include what is described in the following steps.
(1) And sequencing each first protocol list in the target protocol message according to the size sequence of the first priority to obtain a first sequencing sequence.
(2) And sequencing each second protocol list in the target protocol message according to the size sequence of the second priority to obtain a second sequencing sequence.
(3) And sequentially comparing each first protocol list in the first sequencing sequence with each second protocol list in the second sequencing sequence to obtain a comparison result.
It can be understood that through the above steps, confidence weights corresponding to comparison results of different sorting sequences can be determined through hierarchical comparison, so that it can be ensured that whether the comparison results meet preset conditions or not is judged subsequently to provide an accurate data basis.
Further, in the above step, each first protocol list in the first sorting sequence is sequentially compared with each second protocol list in the second sorting sequence to obtain a comparison result, which may specifically include what is described in the following steps.
Firstly, allocating a first sequence weight to each first protocol list in the first ordering sequence and allocating a second sequence weight to each second protocol list in the second ordering sequence; wherein the higher the ranking in the ranking sequence, the higher the sequence weight of the protocol list.
Secondly, for each second protocol list, after a comparison result of the second protocol list and the first protocol list is obtained, a confidence coefficient weight of the comparison result is determined according to a second sequence weight of the second protocol list and a first sequence weight corresponding to the first protocol list.
In this embodiment, the confidence weight may be obtained by multiplying the first sequence weight by the second sequence weight.
On the basis of the above, the comparison result can be obtained by the following steps: unifying the protocol codes of the first protocol list and the second protocol list according to a preset coding sequence to obtain a first target code corresponding to the first protocol list and a second target code corresponding to the second protocol list; and determining the comprehensive matching rate corresponding to the comparison result according to the first target code and the second target code.
Further, the above determination of the comparison result may be achieved by the following specific steps.
(1) Upon comparing a second protocol list to a first protocol list, determining a first list generation logic of the first protocol list and a second list generation logic of the second protocol list.
(2) Mapping the protocol codes in the first protocol list to a preset coding sequence according to the first list generation logic to obtain first target codes, and mapping the protocol codes in the second protocol list to the preset coding sequence according to the second list generation logic to obtain second target codes; the preset coding sequence is used for unifying protocol codes in different protocol lists, and the first target code and the second target code have the same coding bit number.
(3) Comparing the code characters of the first target code and the second target code one by one to obtain a first matching rate; determining the number of continuous coding bits of the first target code and the second target code with the same coding characters on the same coding bits, and obtaining a second matching rate according to the number; and weighting the first matching rate and the second matching rate to obtain a comprehensive matching rate for representing the comparison result.
In specific implementation, the protocol codes generated according to the different list generation logics can be mapped to the preset coding sequence through the content, so that different protocol codes are ensured to have the same code bits in the preset coding sequence, and the code characters on the code bits can be compared one by one and continuously compared. In this way, the comparison result between the first protocol list and the second protocol list can be accurately determined.
Further, in step 140, whether the comparison results corresponding to the second protocol list satisfy a preset condition includes:
step 141, for each second protocol list, determining the accumulated number of the difference value of the comprehensive matching rates of every two comparison results in the plurality of comparison results corresponding to the second protocol list, which falls into the set value interval.
In this embodiment, the difference between each two comparison results may be the difference between the integrated matching rates. The value interval is set for representing the correlation of every two comparison results. It will be appreciated that if the difference falls within the set value interval, the two comparisons are not characterized as being relevant. However, if the comparison results of the second protocol list are not correlated, it is indicated that noise occurs when the comparison results are determined, and therefore, a confidence level needs to be set for the uncorrelated comparison results to ensure reliability of subsequent access detection.
Step 142, when the cumulative number corresponding to each second protocol list reaches the set proportion of the number of the comparison results corresponding to the protocol list, determining that the second protocol list does not meet the preset condition; and when the accumulated quantity corresponding to each second protocol list does not reach the set proportion of the quantity of the comparison results corresponding to the protocol list, determining that the second protocol list meets the preset condition.
For example, the accumulated number is m, the number of comparison results corresponding to the second protocol list is k, and m and k are positive integers. If m reaches k/2, the second protocol list is represented to not meet the preset condition, and if m does not reach k/2, the second protocol list is represented to meet the preset condition.
It is to be understood that, in the present embodiment, the preset condition may be understood as a condition that the second protocol list is weighted in consideration of the confidence.
Further, when the second protocol list satisfies a preset condition, a confidence weight determined before the second protocol list can be configured is indicated.
On the basis of the above, the verification record of the list characteristics corresponding to the second protocol list, which is described in step 140, determines whether the video terminal to be accessed passes the access verification, which may be specifically obtained by the method described in the following step.
Firstly, determining a safety factor in a verification record of list characteristics corresponding to each second protocol list meeting a preset condition; and the safety factor is used for representing the safety of the video terminal to be accessed in a communication protocol layer.
Secondly, according to the confidence coefficient weight corresponding to each protocol list, weighting and summing are carried out on each safety coefficient, and a comprehensive safety coefficient used for representing the safety risk of the video terminal to be accessed relative to the online live broadcast system is obtained.
Finally, determining an early warning safety factor of the online live broadcast system according to the number of the video terminals in the online live broadcast system and the communication relation; when the comprehensive safety coefficient reaches the early warning safety coefficient, determining that the video terminal to be accessed does not pass the access verification; otherwise, determining that the video terminal passes the access authentication.
In this embodiment, the larger the number of video terminals in the online live broadcast system is and the more complex the communication relationship is, the lower the value of the early warning safety factor is. The complexity of the communication relationship is determined by the mutual communication relationship between the video terminals in the online live broadcast system.
It can be understood that, through the above, the confidence weight corresponding to each second protocol list can be taken into account, so as to accurately determine whether the terminal to be accessed passes the access authentication based on the communication protocol layer.
On the basis, after the video terminal to be accessed is accessed into the online live broadcast system, the early warning safety factor needs to be updated, and then the influence of the video terminal to be accessed on the whole online live broadcast system can be taken into consideration when subsequent access verification is carried out. To this end, the above method further comprises: and updating the early warning safety coefficient according to the latest number of the video terminals in the online live video and the latest communication relation.
In an alternative embodiment, after the video terminal to be accessed is accessed to the online live system in step 150, the method may further include the following steps.
Step 21, determining system node parameters and thread information of a video terminal to be accessed in the online live broadcast system; the system node parameters are used for representing the communication level of the video terminal to be accessed in the online live broadcast system, and the thread information is used for representing the thread information of video interaction between the video terminal to be accessed and other video terminals in the online live broadcast system.
Step 22, on the premise that the instant video packet of the video terminal to be accessed is determined according to the system node parameters, determining the thread matching degree between each thread information of the video terminal to be accessed under the continuous video packet and each thread information of the video terminal to be accessed under the instant video packet according to the thread information of the video terminal to be accessed under the instant video packet and the channel occupancy rate of the thread information, and adjusting the thread information of the video terminal to be accessed under the continuous video packet and the thread information matched with the thread information under the instant video packet to the instant video packet.
Step 23, on the premise that the continuous video packet corresponding to the video terminal to be accessed includes multiple pieces of thread information, determining a thread association coefficient between the thread information of the video terminal to be accessed in the continuous video packet according to the thread information of the video terminal to be accessed in the instant video packet and the channel occupancy rate of the thread information, and merging the thread information in the continuous video packet according to the thread association coefficient between the thread information to obtain at least multiple pieces of target thread information.
And step 24, setting thread priority for each target thread information according to the thread information of the video terminal to be accessed under the instant video packet and the channel occupancy rate of the thread information, and adjusting each target thread information to be accessed under the instant video packet according to the size sequence of the thread priority.
And step 25, allocating corresponding memory resources to the instant video packets and the continuous video packets according to the ratio of the number of the thread information under the instant video packets to the number of the thread information under the continuous video packets.
It can be understood that through the contents described in the above steps 21 to 25, after the video terminal to be accessed accesses the online live broadcast system, the thread information in the instant video packet and the continuous video packet corresponding to the video terminal to be accessed can be adjusted and optimized, and corresponding memory resources are allocated to the instant video packet and the continuous video packet based on the ratio between the number of the thread information in the instant video packet and the number of the thread information in the continuous video packet. Therefore, the low-latency performance of the video terminal to be accessed in the video interaction in the online live broadcast system can be ensured.
On the basis of the above method embodiment, as shown in fig. 3, an embodiment of an apparatus is further provided in the embodiment of the present invention, which is specifically described as follows.
A1. A video terminal access verification device 600 of an online live broadcast system is applied to a server in the online live broadcast system, the server communicates with a plurality of video terminals in the online live broadcast system through a gateway, and the device at least comprises the following modules.
The message extraction module 601 is configured to extract a target protocol message of an access request after receiving the access request of a video terminal to be accessed through a gateway, and perform first protocol list extraction based on the target protocol message.
A hierarchical comparison module 602, configured to compare the first protocol list of the target protocol packet with a second protocol list of each original protocol packet in a preset database; and if the extracted first protocol lists of the target protocol message are multiple, comparing the first protocol lists with the second protocol lists in a grading manner according to the first priority preset by the gateway for each first protocol list of the target protocol message and the second priority preset by the server for each second protocol list, so as to obtain a comparison result of each first protocol list corresponding to each second protocol list.
The access verification module 603 is configured to determine whether the video terminal to be accessed passes the access verification according to the verification record of the list characteristics corresponding to the second protocol list when the multiple comparison results corresponding to the second protocol list satisfy the preset condition.
An access response module 604, configured to access the video terminal to be accessed to the online live broadcast system when it is determined that the video terminal to be accessed passes the access authentication; and when the video terminal to be accessed is determined not to pass the access verification, sending prompt information carrying the terminal identification of the video terminal to be accessed to the gateway.
A2. The apparatus of a1, the hierarchical comparison module 602 to:
sequencing each first protocol list in the target protocol message according to the size sequence of the first priority to obtain a first sequencing sequence;
sequencing each second protocol list in the target protocol message according to the size sequence of the second priority to obtain a second sequencing sequence;
and sequentially comparing each first protocol list in the first sequencing sequence with each second protocol list in the second sequencing sequence to obtain a comparison result.
A3. The apparatus of a2, the hierarchical comparison module 602 to:
assigning a first sequence weight to each first protocol list in the first ordered sequence and a second sequence weight to each second protocol list in the second ordered sequence; wherein the higher the sequence weight of the protocol list in the sorted sequence;
and for each second protocol list, after a comparison result of the second protocol list and the first protocol list is obtained, determining a confidence coefficient weight of the comparison result according to the second sequence weight of the second protocol list and the first sequence weight corresponding to the first protocol list.
A4. The apparatus of a3, the hierarchical comparison module 602 to:
unifying the protocol codes of the first protocol list and the second protocol list according to a preset coding sequence to obtain a first target code corresponding to the first protocol list and a second target code corresponding to the second protocol list;
and determining the comprehensive matching rate corresponding to the comparison result according to the first target code and the second target code.
Wherein the hierarchical comparison module 602 is further configured to:
determining a first list generation logic of a first protocol list and a second list generation logic of a second protocol list when comparing the second protocol list with the first protocol list;
mapping the protocol codes in the first protocol list to a preset coding sequence according to the first list generation logic to obtain first target codes, and mapping the protocol codes in the second protocol list to the preset coding sequence according to the second list generation logic to obtain second target codes; the preset coding sequence is used for unifying protocol codes in different protocol lists, and the first target code and the second target code have the same coding bit number;
comparing the code characters of the first target code and the second target code one by one to obtain a first matching rate; determining the number of continuous coding bits of the first target code and the second target code with the same coding characters on the same coding bits, and obtaining a second matching rate according to the number; and weighting the first matching rate and the second matching rate to obtain a comprehensive matching rate for representing the comparison result.
A5. The apparatus of a4, the access authentication module 603 configured to:
determining the accumulated quantity of the difference value of the comprehensive matching rates of every two comparison results in the plurality of comparison results corresponding to each second protocol list, which falls into a set numerical value interval, aiming at each second protocol list;
when the accumulated number corresponding to each second protocol list reaches the set proportion of the number of the comparison results corresponding to the protocol list, determining that the second protocol list does not meet the preset condition; and when the accumulated quantity corresponding to each second protocol list does not reach the set proportion of the quantity of the comparison results corresponding to the protocol list, determining that the second protocol list meets the preset condition.
A6. The apparatus of claim 5, the access authentication module 603 is configured to:
determining a safety factor in the verification record of the list characteristics corresponding to each second protocol list meeting the preset conditions; the safety factor is used for representing the safety of the video terminal to be accessed in a communication protocol layer;
according to the confidence coefficient weight corresponding to each protocol list, carrying out weighted summation on each safety coefficient to obtain a comprehensive safety coefficient used for representing the safety risk of the video terminal to be accessed relative to the online live broadcast system;
determining an early warning safety factor of the online live broadcast system according to the number of the video terminals in the online live broadcast system and the communication relation; when the comprehensive safety coefficient reaches the early warning safety coefficient, determining that the video terminal to be accessed does not pass the access verification; otherwise, determining that the video terminal passes the access authentication.
A7. The apparatus of a6, the apparatus further comprising: a coefficient update module 605 to: and updating the early warning safety coefficient according to the latest number of the video terminals in the online live video and the latest communication relation.
A8. According to the apparatus of a1, the packet extraction module 601 is configured to:
analyzing the access request to obtain a request message sequence corresponding to the access request; the request message sequence comprises a plurality of continuous message frames, and each message frame comprises frame head information, frame information and frame tail information;
screening out a plurality of groups of first message frame sets from the request message sequence; wherein, every two message frames in each group of first message frame set at least meet the condition that the frame head information is the same or the frame tail information is the same;
screening a plurality of groups of second message frame sets from the plurality of groups of first message frame sets; wherein all message frames in the second message frame set are continuous message frames;
extracting frame information of each message frame in each group of second message frame sets, and combining the extracted frame information according to the sequence of the message frames in the second message frame sets to obtain message information corresponding to each group of second message frame sets;
comparing the message information corresponding to each group of second message frame sets with preset information to obtain a similarity value; and determining the message information corresponding to the maximum similarity value as a target protocol message.
The message extraction module 601 is further configured to:
constructing a first message characteristic vector corresponding to message information corresponding to each group of second message frame sets, and constructing a second message characteristic vector corresponding to preset information, wherein the first message characteristic vector and the second message characteristic vector respectively comprise vector values of a plurality of different message length values;
extracting first vector description information of the message information corresponding to each group of second message frame sets in each vector value of the first message feature vector, and determining a vector value with a minimum message length value in the second message feature vectors as a target vector value;
mapping the first vector description information to the target vector value according to a first vector dimension of the first message feature vector and a second vector dimension of the second message feature vector, obtaining second vector description information from the target vector value, and generating similarity comparison logic between message information corresponding to each group of second message frame sets and the preset information according to the first vector description information and the second vector description information;
obtaining a reference vector value in the target vector value by taking the second vector description information as reference information, comparing the reference vector value with the vector value of the first vector description information based on the similarity comparison logic, and obtaining a similarity comparison result corresponding to the reference vector value on the basis of the vector value of the first vector description information;
and weighting the obtained message length value of the vector value corresponding to the first vector description information corresponding to each similarity comparison result to the original similarity value represented by each similarity comparison result to obtain the similarity value between the message information corresponding to each group of second message frame sets and the preset information.
The implementation process of the functions and actions of each module in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, wherein the modules described as separate parts may or may not be physically separate, and the parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the application. One of ordinary skill in the art can understand and implement it without inventive effort.
Further, referring to fig. 4, there is provided a server 100, including: a processor 101, and a memory 102 and a network interface 103 connected to the processor 101; the network interface 103 is connected to a non-volatile memory 104 in the server 100.
With continued reference to fig. 4, the processor 101 retrieves a computer program from the non-volatile memory 104 through the network interface 103 and runs the computer program through the memory 102 to perform the above-mentioned method.
On the basis of the above embodiments, there is further provided a readable storage medium applied to a computer, and the readable storage medium is burned with a computer program, and the computer program implements the method when running in the memory 102 of the server 100 in fig. 4.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the appended claims.

Claims (9)

1. A video terminal access verification method of an online live broadcast system is characterized in that the method is applied to a server in the online live broadcast system, the server communicates with a plurality of video terminals in the online live broadcast system through a gateway, and the method at least comprises the following steps:
after receiving an access request of a video terminal to be accessed through a gateway, extracting a target protocol message of the access request, and extracting a first protocol list based on the target protocol message;
comparing the first protocol list of the target protocol message with the second protocol list of each original protocol message in a preset database;
under the condition that the extracted first protocol lists of the target protocol message are multiple, carrying out hierarchical comparison on each first protocol list and each second protocol list according to a first priority preset by the gateway for each first protocol list of the target protocol message and a second priority preset by the server for each second protocol list, and obtaining a comparison result of each first protocol list corresponding to each second protocol list;
when a plurality of comparison results corresponding to the second protocol list meet preset conditions, determining whether the video terminal to be accessed passes access verification according to verification records of list characteristics corresponding to the second protocol list;
when it is determined that the video terminal to be accessed passes the access verification, accessing the video terminal to be accessed to the online live broadcast system; when the fact that the video terminal to be accessed does not pass the access verification is determined, sending prompt information carrying a terminal identification of the video terminal to be accessed to the gateway;
specifically, it is determined that a plurality of comparison results corresponding to the second protocol list satisfy a preset condition in the following manner:
determining the accumulated quantity of the difference value of the comprehensive matching rates of every two comparison results in the plurality of comparison results corresponding to each second protocol list, which falls into a set numerical value interval, aiming at each second protocol list;
and when the accumulated quantity corresponding to each second protocol list does not reach the set proportion of the quantity of the comparison results corresponding to the protocol list, determining that the second protocol list meets the preset condition.
2. The method according to claim 1, wherein said comparing, according to a first priority preset by the gateway for each first protocol list of the target protocol packet and a second priority preset by the server for each second protocol list, the first protocol lists with the second protocol lists in a hierarchical manner to obtain a comparison result of each first protocol list corresponding to each second protocol list, comprises:
sequencing each first protocol list in the target protocol message according to the size sequence of the first priority to obtain a first sequencing sequence;
sequencing each second protocol list in the target protocol message according to the size sequence of the second priority to obtain a second sequencing sequence;
and sequentially comparing each first protocol list in the first sequencing sequence with each second protocol list in the second sequencing sequence to obtain a comparison result.
3. The method of claim 2, wherein comparing each first protocol list in the first ordered sequence with each second protocol list in the second ordered sequence in turn to obtain a comparison result comprises:
assigning a first sequence weight to each first protocol list in the first ordered sequence and a second sequence weight to each second protocol list in the second ordered sequence; wherein the higher the sequence weight of the protocol list in the sorted sequence;
and for each second protocol list, after a comparison result of the second protocol list and the first protocol list is obtained, determining a confidence coefficient weight of the comparison result according to the second sequence weight of the second protocol list and the first sequence weight corresponding to the first protocol list.
4. The method of claim 3, wherein the comparison result is obtained by:
unifying the protocol codes of the first protocol list and the second protocol list according to a preset coding sequence to obtain a first target code corresponding to the first protocol list and a second target code corresponding to the second protocol list;
and determining the comprehensive matching rate corresponding to the comparison result according to the first target code and the second target code.
5. The method according to claim 1, wherein determining whether the video terminal to be accessed passes the access authentication according to the authentication record of the list feature corresponding to the second protocol list comprises:
determining a safety factor in the verification record of the list characteristics corresponding to each second protocol list meeting the preset conditions; the safety factor is used for representing the safety of the video terminal to be accessed in a communication protocol layer;
according to the confidence coefficient weight corresponding to each protocol list, carrying out weighted summation on each safety coefficient to obtain a comprehensive safety coefficient used for representing the safety risk of the video terminal to be accessed relative to the online live broadcast system;
determining an early warning safety factor of the online live broadcast system according to the number of the video terminals in the online live broadcast system and the communication relation; when the comprehensive safety coefficient reaches the early warning safety coefficient, determining that the video terminal to be accessed does not pass the access verification; otherwise, determining that the video terminal passes the access authentication.
6. The method of claim 5, further comprising: and updating the early warning safety coefficient according to the latest number of the video terminals in the online live video and the latest communication relation.
7. The method of claim 1, wherein the extracting the target protocol packet of the access request comprises:
analyzing the access request to obtain a request message sequence corresponding to the access request; the request message sequence comprises a plurality of continuous message frames, and each message frame comprises frame head information, frame information and frame tail information;
screening out a plurality of groups of first message frame sets from the request message sequence; wherein, every two message frames in each group of first message frame set at least meet the condition that the frame head information is the same or the frame tail information is the same;
screening a plurality of groups of second message frame sets from the plurality of groups of first message frame sets; wherein all message frames in the second message frame set are continuous message frames;
extracting frame information of each message frame in each group of second message frame sets, and combining the extracted frame information according to the sequence of the message frames in the second message frame sets to obtain message information corresponding to each group of second message frame sets;
comparing the message information corresponding to each group of second message frame sets with preset information to obtain a similarity value; and determining the message information corresponding to the maximum similarity value as a target protocol message.
8. A server, comprising:
a processor, and
a memory and a network interface connected with the processor;
the network interface is connected with a nonvolatile memory in the server;
the processor, when running, retrieves a computer program from the non-volatile memory via the network interface and runs the computer program via the memory to perform the method of any of claims 1-7.
9. A readable storage medium applied to a computer, wherein the readable storage medium is burned with a computer program, and the computer program realizes the method of any one of the above claims 1-7 when running in the memory of the server.
CN202010276496.0A 2020-04-10 2020-04-10 Video terminal access verification method and server of online live broadcast system Expired - Fee Related CN111464837B (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
CN202010276496.0A CN111464837B (en) 2020-04-10 2020-04-10 Video terminal access verification method and server of online live broadcast system
CN202011076062.2A CN112235586A (en) 2020-04-10 2020-04-10 Video terminal security verification method based on live video and server
CN202011076049.7A CN112243001A (en) 2020-04-10 2020-04-10 Communication verification method and server applied to online live broadcast

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010276496.0A CN111464837B (en) 2020-04-10 2020-04-10 Video terminal access verification method and server of online live broadcast system

Related Child Applications (2)

Application Number Title Priority Date Filing Date
CN202011076049.7A Division CN112243001A (en) 2020-04-10 2020-04-10 Communication verification method and server applied to online live broadcast
CN202011076062.2A Division CN112235586A (en) 2020-04-10 2020-04-10 Video terminal security verification method based on live video and server

Publications (2)

Publication Number Publication Date
CN111464837A CN111464837A (en) 2020-07-28
CN111464837B true CN111464837B (en) 2021-04-02

Family

ID=71681000

Family Applications (3)

Application Number Title Priority Date Filing Date
CN202011076049.7A Withdrawn CN112243001A (en) 2020-04-10 2020-04-10 Communication verification method and server applied to online live broadcast
CN202011076062.2A Withdrawn CN112235586A (en) 2020-04-10 2020-04-10 Video terminal security verification method based on live video and server
CN202010276496.0A Expired - Fee Related CN111464837B (en) 2020-04-10 2020-04-10 Video terminal access verification method and server of online live broadcast system

Family Applications Before (2)

Application Number Title Priority Date Filing Date
CN202011076049.7A Withdrawn CN112243001A (en) 2020-04-10 2020-04-10 Communication verification method and server applied to online live broadcast
CN202011076062.2A Withdrawn CN112235586A (en) 2020-04-10 2020-04-10 Video terminal security verification method based on live video and server

Country Status (1)

Country Link
CN (3) CN112243001A (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114584934B (en) * 2022-03-14 2023-01-06 联想(北京)有限公司 Communication processing method, device, system and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004013374A (en) * 2002-06-05 2004-01-15 Nec Corp Unidirectional authentication system
CN101656738A (en) * 2009-09-22 2010-02-24 中兴通讯股份有限公司 Method and device for verifying terminal accessed to network
CN104283848A (en) * 2013-07-03 2015-01-14 杭州华三通信技术有限公司 Terminal access method and device
CN110830333A (en) * 2018-08-09 2020-02-21 中兴通讯股份有限公司 Intelligent household equipment access authentication method, device, gateway and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
SE543198C2 (en) * 2016-10-18 2020-10-20 Telia Co Ab Methods and apparatuses for conditional wifi roaming

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004013374A (en) * 2002-06-05 2004-01-15 Nec Corp Unidirectional authentication system
CN101656738A (en) * 2009-09-22 2010-02-24 中兴通讯股份有限公司 Method and device for verifying terminal accessed to network
CN104283848A (en) * 2013-07-03 2015-01-14 杭州华三通信技术有限公司 Terminal access method and device
CN110830333A (en) * 2018-08-09 2020-02-21 中兴通讯股份有限公司 Intelligent household equipment access authentication method, device, gateway and storage medium

Also Published As

Publication number Publication date
CN112235586A (en) 2021-01-15
CN111464837A (en) 2020-07-28
CN112243001A (en) 2021-01-19

Similar Documents

Publication Publication Date Title
CN112417439B (en) Account detection method, device, server and storage medium
CN109861985B (en) IP wind control method, device, equipment and storage medium based on risk grade division
CN110781433B (en) Data type determining method and device, storage medium and electronic device
CN110166454B (en) Mixed feature selection intrusion detection method based on adaptive genetic algorithm
CN111738735A (en) Image data processing method and device and related equipment
CN112954031B (en) Equipment state notification method based on cloud mobile phone
CN112416730A (en) User internet behavior analysis method and device, electronic equipment and storage medium
CN110995745B (en) Method and device for separating and identifying illegal machine card of Internet of things
CN111464837B (en) Video terminal access verification method and server of online live broadcast system
CN108234454B (en) Identity authentication method, server and client device
CN111542043B (en) Method and device for identifying service request for changing mobile phone number
CN112969172B (en) Communication flow control method based on cloud mobile phone
CN106875184B (en) Abnormal scene simulation method, device and equipment
CN112149093A (en) Identity authentication system and method based on browser fingerprint
CN113098883B (en) Block chain and big data based security protection method and block chain service system
CN111866001B (en) Intelligent equipment data processing method based on big data and cloud computing and cloud server
CN112422570B (en) Game login method and device
CN114296775A (en) Intelligent operation and maintenance method and system based on big data
CN111490992A (en) Intrusion detection method and device based on data flow detection and time sequence feature extraction
CN107222559B (en) Information calling method
CN112149121A (en) Malicious file identification method, device, equipment and storage medium
CN114338216B (en) Multidimensional brushing attack prevention and control method, device, equipment and medium
CN116431459B (en) Distributed log link tracking data processing method and device
CN109657447B (en) Equipment fingerprint generation method and device
CN117745196A (en) Service processing method and system based on multi-system integration

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 650224 Southwest Forestry University, 300 Bailong temple, Kunming, Yunnan

Applicant after: Hong Yi

Address before: 361000 3rd floor, building 6, No. 601, Tonghong Road, Tong'an garden, Tongan Industrial Concentration Zone, Xiamen City, Fujian Province

Applicant before: Hong Yi

CB03 Change of inventor or designer information

Inventor after: Wang Jing

Inventor before: Hong Yi

CB03 Change of inventor or designer information
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210315

Address after: Room 525, building 7, 601 Qiuyi Road, Changhe street, Binjiang District, Hangzhou City, Zhejiang Province, 310051

Applicant after: Hangzhou Qiucha Network Technology Co.,Ltd.

Address before: Southwest Forestry University, 300 bailongsi, Kunming, Yunnan, 650224

Applicant before: Hong Yi

GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210402