CN112468840B - Tamper-proof system and method for third-party EPG (electronic program guide) server in IPTV (Internet protocol television) system - Google Patents

Tamper-proof system and method for third-party EPG (electronic program guide) server in IPTV (Internet protocol television) system Download PDF

Info

Publication number
CN112468840B
CN112468840B CN202011325885.4A CN202011325885A CN112468840B CN 112468840 B CN112468840 B CN 112468840B CN 202011325885 A CN202011325885 A CN 202011325885A CN 112468840 B CN112468840 B CN 112468840B
Authority
CN
China
Prior art keywords
module
epg
server
top box
page
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011325885.4A
Other languages
Chinese (zh)
Other versions
CN112468840A (en
Inventor
卢金禹
华博
解文龙
谷阳
王同庆
焦磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hebei Radio & Tv Wireless Media Co ltd
Original Assignee
Hebei Radio & Tv Wireless Media Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hebei Radio & Tv Wireless Media Co ltd filed Critical Hebei Radio & Tv Wireless Media Co ltd
Priority to CN202011325885.4A priority Critical patent/CN112468840B/en
Publication of CN112468840A publication Critical patent/CN112468840A/en
Application granted granted Critical
Publication of CN112468840B publication Critical patent/CN112468840B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/222Secondary servers, e.g. proxy server, cable television Head-end
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/24Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
    • H04N21/2407Monitoring of transmitted content, e.g. distribution time, number of downloads
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/262Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission, generating play-lists
    • H04N21/26291Content or additional data distribution scheduling, e.g. sending additional data at off-peak times, updating software modules, calculating the carousel transmission frequency, delaying a video stream transmission, generating play-lists for providing content or additional data updates, e.g. updating software modules, stored at the client
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/431Generation of visual interfaces for content selection or interaction; Content or additional data rendering
    • H04N21/4312Generation of visual interfaces for content selection or interaction; Content or additional data rendering involving specific graphical features, e.g. screen layout, special fonts or colors, blinking icons, highlights or animations
    • H04N21/4314Generation of visual interfaces for content selection or interaction; Content or additional data rendering involving specific graphical features, e.g. screen layout, special fonts or colors, blinking icons, highlights or animations for fitting data in a restricted space on the screen, e.g. EPG data in a rectangular grid
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/478Supplemental services, e.g. displaying phone caller identification, shopping application
    • H04N21/4782Web browsing, e.g. WebTV
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/81Monomedia components thereof
    • H04N21/8166Monomedia components thereof involving executable data, e.g. software

Abstract

The invention relates to a third-party EPG server tamper-proof system and method in IPTV system, the said tamper-proof system links to user's set-top box and partner's EPG server, the user's set-top box visits the said partner's EPG server through the said tamper-proof system; the tamper-proof system is used for acquiring and monitoring an EPG page of the EPG server of the partner, and determining whether the set top box of the user is allowed to access the EPG server of the partner according to whether the access request of the set top box of the user is in compliance or not.

Description

Tamper-proof system and method for third-party EPG (electronic program guide) server in IPTV (Internet protocol television) system
Technical Field
The invention relates to the technical field of IPTV video, in particular to a third-party EPG server tamper-proofing system and a third-party EPG server tamper-proofing method in an IPTV system.
Background
At present, the scale of IPTV is getting larger and larger, taking north river as an example, the current IPTV users reach 1630 ten thousands of households, the user scale covering 75% of north river has become a main broadcasting control medium, and data security has become an important issue. The IPTV provides media services to the television terminal users through the EPG server by means of the communication network of the operator. IPTV is open in different places from traditional cable tv, and there are many third party content partners enriching EPG blocks. This also puts higher demands on the secure presentation of the EPG. Technical schemes of different content partner companies are inconsistent, system architectures are not uniform, and broadcast control systems cannot be uniformly connected. For normal operation update work, it is also impossible to ensure that the third-party EPG content is safe and compliant by deploying a file tamper-proof or database tamper-proof system. Finally, when the partner server is maliciously tampered, timely discovery and timely processing are also very important for safe broadcasting.
Disclosure of Invention
Aiming at the technical problems in the prior art, the invention provides an anti-tampering system of a third-party EPG server in an IPTV system, wherein the anti-tampering system is connected between a user set-top box and a partner EPG server, and the user set-top box accesses the partner EPG server through the anti-tampering system; the tamper-resistant system is used for acquiring and monitoring an EPG page of an EPG server of a partner and providing a compliant EPG access page for a set-top box of a user.
Specifically, the system comprises:
the virtual set-top box module is connected with the partner EPG server and used for traversing and accessing EPG pages provided by all the partner EPG servers according to the specified access frequency and carrying out data processing to generate static page data; the static page data comprises page code data and resource material data;
the static rendering server is used for periodically receiving and storing static page data generated by the virtual set top box module;
the comparison module is used for comparing the static page data generated by the virtual set top box module with the static page data stored in the static rendering server, and if the static page data and the static page data are different, the comparison result is sent to the auditing module;
the checking module is used for checking whether the difference data in the comparison result are in compliance;
and the preposed service agent module is used for making different access forwarding strategies according to the auditing result.
Further, the virtual set-top box module comprises: the system comprises a code rewriting module, a material extraction module, a code compression module and an access cycle control module;
the code rewriting module is used for reprogramming EPG page source codes provided by the partner EPG server and statically replacing dynamic resource addresses in the dynamic web pages;
the material extraction module is used for extracting resource materials in the EPG page;
the code compression module is used for compressing and packaging static replaced EPG page codes and resource materials;
and the access cycle control module is used for setting the access frequency of the virtual set-top box module to the partner EPG server.
Further, the static rendering server comprises a life cycle controller and a static page server;
the life cycle controller is used for setting the life cycle of the static page data received and stored by the static rendering server, and when the life cycle is finished, the static rendering server sends an instruction to the virtual set top box to reacquire the EPG page provided by the EPG server of the partner;
and the static page server is used for responding to the access request of the set top box of the user according to the access forwarding strategy of the preposed service agent module.
Furthermore, the comparison module comprises a code comparison module and a material comparison module, which are respectively used for comparing the page code data with the resource material data.
Furthermore, the auditing module comprises an intelligent auditing module and a manual auditing module;
the intelligent auditing module is used for identifying specific contents in the difference data in the comparison result, judging the risk degree of the page, generating work order data with the page path as the unique identifier and sending the work order data to the manual auditing module;
and the manual auditing module is used for finally judging whether the difference data in the comparison result is in compliance or not.
Further, the pre-service agent module formulates different access forwarding strategies according to the auditing result, and the method comprises the following steps:
if the verification result is that the EPG page is judged to be not compliant, the prepositive service agent module forwards the access request of the user set top box to the static rendering server, and if the verification result is that the EPG page is judged to be compliant, the prepositive service agent module forwards the access request of the user set top box to the partner EPG server.
On the other hand, the invention provides a tamper-proof method for a third-party EPG server in an IPTV system, which comprises the following steps:
setting an anti-tampering system and connecting the anti-tampering system between a user set top box and a partner EPG server, wherein the user set top box accesses the partner EPG server through the anti-tampering system;
the tamper-resistant system is used for acquiring and monitoring an EPG page of an EPG server of a partner and providing a compliant EPG access page for a set-top box of a user.
Further, the tamper-resistant system includes: the system comprises a virtual set-top box module, a static rendering server, a comparison module, an audit module and a preposed service agent module; the anti-tampering method specifically comprises the following steps:
the virtual set-top box module is connected with the partner EPG server, traverses and accesses EPG pages provided by all the partner EPG servers according to the specified access frequency, and performs data processing to generate static page data; the static page data comprises page code data and resource material data;
the static rendering server periodically receives and stores static page data generated by the virtual set top box module;
the comparison module compares the static page data generated by the virtual set top box module with the static page data stored in the static rendering server, and if the static page data and the static page data are different, the comparison result is sent to the verification module;
the auditing module audits whether the difference data in the comparison result is in compliance;
the preposed service agent module makes different access forwarding strategies according to the auditing result;
and when the user set top box accesses, the user set top box directly accesses the front server agent module, and the front server agent module determines that the user set top box accesses the static rendering server or the partner EPG server according to the verification result.
The beneficial effects of the invention are: due to the fact that the IPTV brings the defect that the security of the EPG server content is grasped by the broadcasting and television side from the system architecture, the broadcasting control security is a serious task for the current IPTV service. Since the operation mode of the IPTV service belongs to multiparty cooperation operation, how to effectively perform broadcast audit management and control on EPG content update is a difficulty to be solved for the IPTV service. The scheme provides a set of tamper-proof system adaptive to various third-party EPG servers, and the EPG content safety is effectively ensured.
According to the scheme, the updating of the EPG content can be detected in time, and the unviewed updating content is rapidly shielded through routing scheduling. The situation that a third party staff gets online without checking the EPG updating is avoided.
Drawings
Fig. 1 is a tamper-resistant system structure and a tamper-resistant flowchart provided in an embodiment of the present invention.
Detailed Description
The principles and features of this invention are described below in conjunction with the following drawings, which are set forth by way of illustration only and are not intended to limit the scope of the invention.
As shown in fig. 1, an embodiment of the present invention provides a tamper-resistant system for a third-party EPG server in an IPTV system, where the tamper-resistant system is connected between a user set-top box and a partner EPG server, and the user set-top box accesses the partner EPG server through the tamper-resistant system; the tamper-resistant system is used for acquiring and monitoring an EPG page of an EPG server of a partner and providing a compliant EPG access page for a set-top box of a user.
Specifically, the system comprises:
the virtual set-top box module is connected with the partner EPG server and used for traversing and accessing EPG pages provided by all the partner EPG servers according to the specified access frequency and carrying out data processing to generate static page data; the static page data comprises page code data and resource material data;
the static rendering server is used for periodically receiving and storing static page data generated by the virtual set top box module;
the comparison module is used for comparing the static page data generated by the virtual set top box module with the static page data stored in the static rendering server, and if the static page data and the static page data are different, the comparison result is sent to the verification module;
the auditing module is used for auditing whether the difference data in the comparison result are in compliance or not;
and the preposed service agent module is used for formulating different access forwarding strategies according to the auditing result and executing different access forwarding strategies according to the access request of the set top box of the user.
Further, the virtual set-top box module comprises: the system comprises a code rewriting module, a material extraction module, a code compression module and an access cycle control module;
the code rewriting module is used for reprogramming EPG page source codes provided by the partner EPG server and statically replacing dynamic resource addresses in the dynamic web pages;
the material extraction module is used for extracting resource materials in the EPG page;
the code compression module is used for compressing and packaging static replaced EPG page codes and resource materials;
and the access cycle control module is used for setting the access frequency of the virtual set-top box module to the partner EPG server.
Further, the static rendering server comprises a life cycle controller and a static page server;
the life cycle controller is used for setting the life cycle of the static page data received and stored by the static rendering server, and when the life cycle is finished, the static rendering server sends an instruction to the virtual set top box to reacquire the EPG page provided by the EPG server of the partner;
and the static page server is used for responding to the access request of the set top box of the user according to the access forwarding strategy of the preposed service agent module.
Furthermore, the comparison module comprises a code comparison module and a material comparison module, which are respectively used for comparing the page code data with the resource material data.
Furthermore, the auditing module comprises an intelligent auditing module and a manual auditing module;
the intelligent auditing module is used for identifying specific contents in the difference data in the comparison result, judging the risk degree of the page, generating work order data with the page path as the unique identifier and sending the work order data to the manual auditing module;
and the manual auditing module is used for finally judging whether the difference data in the comparison result is in compliance or not.
Further, the front service agent module executes different access forwarding policies according to the access request of the user set top box, including:
and the front server agent module judges whether the access of the user set top box is in compliance, if so, the front server agent module directly accesses the corresponding partner EPG server, otherwise, the front server agent module carries out redirection processing, and the access of the user set top box is oriented to a static page server.
At system initialization, we assume that the EPG pages provided by the partner EPG server all have passed manual review, i.e. the content of the EPG pages provided by the partner EPG server is compliant content. During normal operation update work, the partner EPG server may be maliciously tampered with. At this time, the tampered EPG page is determined to be out of compliance because the tampered EPG page is not subjected to manual review.
Under the above assumption, the execution flow of the system is as follows:
(1) the virtual set top box module traverses and accesses the EPG page of the partner for processing, the code rewriting module is responsible for reprogramming the source code of the page of the partner, the dynamic resource address in the dynamic webpage is statically replaced, and the resource material in the page is extracted through the material extraction module.
At present, most of webpage development adopts a dynamic rendering mode to acquire material resources from a background database, a js script rendering mode is used for generating a webpage, and webpage codes and materials cannot be acquired through a server file path. And after the virtual set top box module simulates and renders the EPG, the rendered page codes and resource materials are statically replaced to form a traditional static page.
And finally, compressing and packaging the static page codes and the material resources through a code compression module to complete the process of converting the dynamic page into the static page. And (3) the virtual set top box repeats the step (1) and outputs the static page to the step (6) and the step (7) according to the access frequency strategy of the access period management module to the partner page.
(2) And (3) storing the partner EPG page output by the virtual set-top box module in a packing manner into a partner static rendering server, wherein the life cycle controller is a module for uniformly managing the stored partner static page, when the life cycle of the page is finished, sending an instruction to the virtual set-top box module to repeat the steps (1), (6) and (7), and if the page is not updated, resetting the life cycle of the page. And (4) if the codes in the step (6) are compared or the material comparison in the step (7) is judged to be different, the subsequent processing step is carried out.
(6) And (7) the step is to carry out code comparison and material comparison links on the static page output in the step (1) and the page of the old version cached in the static page server of the partner.
(8) And the intelligent image identification auditing module performs sudden-terrorist administrative identification, pornographic identification, bad scene identification and advertisement two-dimensional code identification on the image materials in the page, and judges the risk degree of the page.
(9) And (4) summarizing the page change data discovered in the steps (6) and (7) and the page risk data given in the step (8) to form work order data which takes the page path as a unique identifier and sends the work order data to a manual review module, and third-party EPG maintainers need to use the manual review module to modify and supplement corresponding work orders after updating EPG pages. And the auditor carries out auditing through the terminal.
And (4) the R updates the preposed service agent strategy according to the page path of the work order, the work order preposed service agent which is not approved or not approved redirects a page request, and when the user set top box accesses the EPG page, the preposed service agent module directs the access path to a static page server of the partner, namely the step (4). And (5) automatically forwarding the request to the partner EGP server by the pre-service agent of the work order passing the examination.
(3) And (5) show the flow of the user accessing the third-party EPG server. When the third-party EPG server is not monitored for tamper-proofing, the set-top box of the user directly accesses the server to obtain related page and interface services. Once the EPG page is maliciously tampered with, the user set-top box will receive the content of the page that is not compliant. After the third-party EPG tamper-proof system is added, the set-top box of the user does not directly access the third-party EPG server. And (5) accessing the preposed service agent module, wherein the agent module does not perform redirection processing according to the forwarding strategy if the current EPG page is a compliant page, and accessing the original partner server as shown in the step (5). And (5) if the current EPG page is not in accordance with the rule, performing redirection processing, and accessing a static page server of the partner as shown in the step (4).
All pages and content updating in the third-party EPG operation need to be audited by radio and television content auditors according to the standard such as 'notice about further standardizing the network audio-visual program propagation order' and 'content audit standard detailed rule' issued by the national radio and television bureau, so that the safety of broadcast content and the safety of transmission are ensured, and the content can be managed and controlled. And the pages and the content updates which are not audited by the auditors are considered to be not compliant.
However, the technical scheme adopted by the third-party EPG server is not uniform, so that operation and updating can not be uniformly performed through the IPTV broadcast control platform, and each partner has an own EPG operation background. And a third-party EPG server tamper-proof system is added to ensure that the change can be timely discovered.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (7)

1. A third-party EPG server tamper-proof system in an IPTV system is characterized in that the tamper-proof system is connected between a user set-top box and a partner EPG server, and the user set-top box accesses the partner EPG server through the tamper-proof system; the tamper-proof system is used for acquiring and monitoring an EPG page of an EPG server of a partner and providing a compliant EPG access page for a set-top box of a user;
the tamper-resistant system includes:
the virtual set-top box module is connected with the partner EPG server and used for traversing and accessing EPG pages provided by all the partner EPG servers according to the specified access frequency and carrying out data processing to generate static page data; the static page data comprises page code data and resource material data;
the static rendering server is used for periodically receiving and storing the static page data generated by the virtual set top box module;
the comparison module is used for comparing the static page data generated by the virtual set top box module with the static page data stored in the static rendering server, and if the static page data and the static page data are different, the comparison result is sent to the verification module;
the auditing module is used for auditing whether the difference data in the comparison result are in compliance or not;
and the preposed service agent module is used for making different access forwarding strategies according to the auditing result.
2. The tamper-resistant system of claim 1, wherein the virtual set-top box module comprises: the system comprises a code rewriting module, a material extraction module, a code compression module and an access cycle control module;
the code rewriting module is used for reprogramming EPG page source codes provided by the partner EPG server and statically replacing dynamic resource addresses in the dynamic web pages;
the material extraction module is used for extracting resource materials in the EPG page;
the code compression module is used for compressing and packaging static replaced EPG page codes and resource materials;
and the access cycle control module is used for setting the access frequency of the virtual set top box module to the partner EPG server.
3. The tamper-resistant system of claim 1, wherein the static rendering server comprises a lifecycle controller and a static page server;
the life cycle controller is used for setting the life cycle of the static page data received and stored by the static rendering server, and when the life cycle is finished, the static rendering server sends an instruction to the virtual set-top box to reacquire the EPG page provided by the EPG server of the partner;
and the static page server is used for responding to the access request of the set top box of the user according to the access forwarding strategy of the preposed service agent module.
4. The tamper-resistant system according to claim 1, wherein the comparison module includes a code comparison module and a material comparison module, respectively for comparing the page code data and the resource material data.
5. The tamper-resistant system according to claim 1, wherein the audit module includes an intelligent audit module and a manual audit module;
the intelligent auditing module is used for identifying specific contents in the difference data in the comparison result, judging the risk degree of the page, generating a work order data with the page path as the unique identifier and sending the work order data to the manual auditing module;
and the manual auditing module is used for finally judging whether the difference data in the comparison result is in compliance.
6. The tamper-resistant system according to claim 1, wherein the pre-service agent module formulates different access forwarding policies according to the audit result, including:
if the verification result is that the EPG page is judged to be not compliant, the prepositive service agent module forwards the access request of the user set top box to the static rendering server, and if the verification result is that the EPG page is judged to be compliant, the prepositive service agent module forwards the access request of the user set top box to the partner EPG server.
7. A tamper-proofing method for a third-party EPG server in an IPTV system is characterized by comprising the following steps:
setting an anti-tampering system and connecting the anti-tampering system between a user set top box and an EPG server of a partner, wherein the user set top box accesses the EPG server of the partner through the anti-tampering system;
the tamper-resistant system is used for acquiring and monitoring an EPG page of an EPG server of a partner and providing a compliant EPG access page for a set-top box of a user;
the tamper-resistant system includes: the system comprises a virtual set-top box module, a static rendering server, a comparison module, an audit module and a prepositive service agent module; the anti-tampering method specifically comprises the following steps:
the virtual set-top box module is connected with the partner EPG server, traverses and accesses EPG pages provided by all the partner EPG servers according to the specified access frequency, and performs data processing to generate static page data; the static page data comprises page code data and resource material data;
the static rendering server periodically receives and stores static page data generated by the virtual set top box module;
the comparison module compares the static page data generated by the virtual set top box module with the static page data stored in the static rendering server, and if the static page data and the static page data are different, the comparison result is sent to the verification module;
the auditing module audits whether the difference data in the comparison result is in compliance;
the preposed service agent module makes different access forwarding strategies according to the auditing result;
and when the user set top box accesses, the user set top box directly accesses the front server agent module, and the front server agent module determines that the user set top box accesses the static rendering server or the partner EPG server according to the checking result.
CN202011325885.4A 2020-11-23 2020-11-23 Tamper-proof system and method for third-party EPG (electronic program guide) server in IPTV (Internet protocol television) system Active CN112468840B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011325885.4A CN112468840B (en) 2020-11-23 2020-11-23 Tamper-proof system and method for third-party EPG (electronic program guide) server in IPTV (Internet protocol television) system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011325885.4A CN112468840B (en) 2020-11-23 2020-11-23 Tamper-proof system and method for third-party EPG (electronic program guide) server in IPTV (Internet protocol television) system

Publications (2)

Publication Number Publication Date
CN112468840A CN112468840A (en) 2021-03-09
CN112468840B true CN112468840B (en) 2022-12-16

Family

ID=74798261

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011325885.4A Active CN112468840B (en) 2020-11-23 2020-11-23 Tamper-proof system and method for third-party EPG (electronic program guide) server in IPTV (Internet protocol television) system

Country Status (1)

Country Link
CN (1) CN112468840B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113419763B (en) * 2021-07-16 2024-03-29 南京炫佳网络科技有限公司 Data processing method, device, equipment and storage medium
CN114827729B (en) * 2022-05-07 2023-10-20 烽火通信科技股份有限公司 EPG (electronic program guide) online detection method, device and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002203070A (en) * 2000-10-17 2002-07-19 Hitachi Ltd Metadata distribution method
CN102026025A (en) * 2009-09-10 2011-04-20 北京盛景无限文化传媒有限公司 Program integrated operation comprehensive management system
CN103248916A (en) * 2013-05-16 2013-08-14 清新视界(北京)科技有限公司 Electronic program guide (EPG) interaction system for interactive television
CN106446063A (en) * 2016-09-06 2017-02-22 深圳市牛商网络股份有限公司 Webpage updating system
CN108551592A (en) * 2018-03-12 2018-09-18 四川合智聚云科技有限公司 It is a kind of based on the EPG of IPTV from method of combination and its system

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1268128C (en) * 2001-08-06 2006-08-02 皇家飞利浦电子股份有限公司 System and method for combining several EPG sources to one reliable EPG
CN102131110B (en) * 2010-09-20 2013-08-28 华为技术有限公司 System and method for issuing IPTV (internet protocol television) contents
CN102571791B (en) * 2011-12-31 2015-03-25 奇智软件(北京)有限公司 Method and system for analyzing tampering of Web page contents
CN102609503A (en) * 2012-02-02 2012-07-25 福建榕基软件股份有限公司 Method and device for generating static webpages
CN102572605B (en) * 2012-02-09 2013-11-13 成都三零凯天通信实业有限公司 System and method for integrating third-party informatization of IPTV system
WO2014046824A1 (en) * 2012-09-18 2014-03-27 Flextronics Ap, Llc Sourcing epg data
CN108650527B (en) * 2018-03-12 2020-12-15 百途新媒体技术(北京)有限公司 EPG security monitoring method and system based on IPTV
CN111324912B (en) * 2018-12-14 2023-03-28 中国电信股份有限公司 File checking method, system and computer readable storage medium
CN110430449A (en) * 2019-08-14 2019-11-08 山东海看新媒体研究院有限公司 A kind of TV big data processing method and system based on electronic program guides
CN110516183A (en) * 2019-08-30 2019-11-29 深圳点猫科技有限公司 The generation method and device of static Web page

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2002203070A (en) * 2000-10-17 2002-07-19 Hitachi Ltd Metadata distribution method
CN102026025A (en) * 2009-09-10 2011-04-20 北京盛景无限文化传媒有限公司 Program integrated operation comprehensive management system
CN103248916A (en) * 2013-05-16 2013-08-14 清新视界(北京)科技有限公司 Electronic program guide (EPG) interaction system for interactive television
CN106446063A (en) * 2016-09-06 2017-02-22 深圳市牛商网络股份有限公司 Webpage updating system
CN108551592A (en) * 2018-03-12 2018-09-18 四川合智聚云科技有限公司 It is a kind of based on the EPG of IPTV from method of combination and its system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
OTT业务EPG防篡改与应急机制的研究与实践;王雷等;《电信技术》;20160925(第09期);全文 *
利用大数据进行广播电视监测的探究;周传淯;《才智》;20200325(第09期);全文 *

Also Published As

Publication number Publication date
CN112468840A (en) 2021-03-09

Similar Documents

Publication Publication Date Title
US9219787B1 (en) Stateless cookie operations server
CN106603311A (en) OTA upgrade method, client, server and system
CN102752326B (en) The method of deal with data, server and system in the time of download file
CN112468840B (en) Tamper-proof system and method for third-party EPG (electronic program guide) server in IPTV (Internet protocol television) system
CN103544430B (en) Operation environment safety method and electronic operation system
CA3152829A1 (en) Method and apparatus for processing business data
CN106911502B (en) A kind of upgrade method and system of intelligent home gateway equipment
KR101560185B1 (en) Method for controlling device using URL in distributed network environment and apparatus thereof
CN103313289A (en) Wap system automatic test system and method
CN108134708B (en) Method and device for monitoring third-party interface
CN101305555B (en) Multimedia middleware apparatus using metadata, method for controlling multimedia middleware
CN109618176B (en) Processing method, equipment and storage medium for live broadcast service
CN113590497A (en) Business service test method and device, electronic equipment and storage medium
CN107704360A (en) Processing method, equipment, server and the storage medium of monitoring data
CN111083093B (en) Method and device for calling terminal capability, electronic equipment and storage medium
CN105072139A (en) Recommendation method and recommendation device
CN111597543A (en) Wide-area process access authority authentication method and system based on block chain intelligent contract
CN113722114A (en) Data service processing method and device, computing equipment and storage medium
CN105556918B (en) A kind of resource downloading method and electronic equipment
CN107454080A (en) One kind is based on internet data security method and system
CN113098758B (en) Enterprise message pushing security gateway system based on enterprise WeChat
CN113687958A (en) Data processing method, system, computer device and storage medium
CN113556359A (en) Communication protocol conversion method, device, system and gateway device
Ladewig et al. Are we ready to play in the cloud? Developing new quality certifications to tackle challenges of cloud gaming services
CN112995357B (en) Domain name management method, device, medium and electronic equipment based on cloud hosting service

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant