CN113923482A - Video playing method, system, electronic equipment and storage medium - Google Patents

Video playing method, system, electronic equipment and storage medium Download PDF

Info

Publication number
CN113923482A
CN113923482A CN202111028242.8A CN202111028242A CN113923482A CN 113923482 A CN113923482 A CN 113923482A CN 202111028242 A CN202111028242 A CN 202111028242A CN 113923482 A CN113923482 A CN 113923482A
Authority
CN
China
Prior art keywords
terminal
video
access
played
access address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111028242.8A
Other languages
Chinese (zh)
Inventor
王建明
高锋
勇智雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing QIYI Century Science and Technology Co Ltd
Original Assignee
Beijing QIYI Century Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing QIYI Century Science and Technology Co Ltd filed Critical Beijing QIYI Century Science and Technology Co Ltd
Priority to CN202111028242.8A priority Critical patent/CN113923482A/en
Publication of CN113923482A publication Critical patent/CN113923482A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/239Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests
    • H04N21/2393Interfacing the upstream path of the transmission network, e.g. prioritizing client content requests involving handling client requests
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26606Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/437Interfacing the upstream path of the transmission network, e.g. for transmitting client requests to a VOD server
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4623Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]

Abstract

The invention relates to a video playing method, a video playing system, electronic equipment and a storage medium. According to the scheme, when the access request for accessing the video to be played by any terminal passes the verification, an access address corresponding to the video to be played is generated and fed back to the terminal sending the access request, the confidentiality of the access address is guaranteed, when the access address of any terminal is received, the authority of the terminal is verified through the access address, whether the terminal is matched with the access address or not is determined, after the authority is verified, the terminal is allowed to access the video to be played, if the authority is not verified, the terminal is refused to access the video to be played, and the safety of the video to be played is improved.

Description

Video playing method, system, electronic equipment and storage medium
Technical Field
The present invention relates to the field of video playing technologies, and in particular, to a video playing method, a video playing system, an electronic device, and a storage medium.
Background
The video website refers to a network medium which enables internet users to smoothly publish, browse and share video works on line under the support of a perfect technical platform, and the scale of the video website is larger and larger as the demand of the internet users for videos is larger and larger.
When videos are played in a browser, some highly sensitive videos are prone to behaviors of downloading, recording or broadcasting video playing addresses privately, for example, newly online movie and television plays, movie and television plays needing authorities or videos used internally, the behaviors are prone to causing video leakage finally, once the videos leak, adverse effects are prone to being caused to video providers, and economic and property losses can be caused seriously.
At present, many videos are played without charge, but a user needs to pay to get access to the playing route of the videos, for example, after the user pays for some training videos, the provider of the training videos provides the playing address of the videos to the paying user, but when the paying user watches the videos, the paying user may spread the playing address, so that other people who do not pay can also see the corresponding videos, and the videos are leaked.
Disclosure of Invention
In order to solve the problem that a playing path of a video is easily acquired by a user and leaked in the prior art, at least one embodiment of the invention provides a video playing method and a video playing system.
In a first aspect, an embodiment of the present invention provides a video playing method, where the playing method includes:
when an access request for accessing a video to be played sent by a first terminal passes verification, feeding back an access address of the video to be played to the first terminal; the access address includes: user identity information and access time information;
when a second terminal accesses the video to be played through the access address, authority verification is carried out on the second terminal through user identity information in the access address and the access time information;
when the authority verification of the second terminal is failed, refusing the second terminal to play the video to be played;
and when the authority verification of the second terminal passes, allowing the second terminal to play the video to be played.
Based on the above technical solutions, the embodiments of the present invention may be further improved as follows.
With reference to the first aspect, in a first embodiment of the first aspect, the performing, by the user identity information in the access address and the access time information, an authority verification on the second terminal includes:
comparing the user identity information in the access address with the user identity information of the second terminal, and judging whether the second terminal is the first terminal;
judging whether the current access time exceeds the preset access time limit or not according to the current access time and the access time information in the access address;
if the second terminal is not the first terminal, or the current access time exceeds the preset access time limit, the permission verification of the second terminal is not passed;
and if the second terminal is the first terminal and the current access time does not exceed the preset access time limit, the permission of the second terminal passes the verification.
With reference to the first aspect, in a second embodiment of the first aspect, the feeding back, to the first terminal, an access address of the video to be played includes:
acquiring user identity information and an access timestamp of the first terminal;
encrypting the access timestamp to obtain an encrypted signature;
and generating the access address according to the user identity information and the encrypted signature.
With reference to the second embodiment of the first aspect, in a third embodiment of the first aspect, before performing the permission check on the second terminal through the user identity information in the access address and the access time information, the method further includes:
judging whether the access timestamp can be obtained by decrypting the encrypted signature in the access address;
and if the encrypted signature can be decrypted to obtain the access timestamp, performing permission verification on the second terminal through the user identity information and the access time information in the access address.
With reference to the first aspect, in a fourth embodiment of the first aspect, before the allowing the second terminal to play the video to be played, the playing method further includes:
and when the authority verification of the second terminal passes, adding a video watermark including the user identity information in the video to be played according to the user identity information in the access address.
With reference to the first aspect, in a fifth embodiment of the first aspect, the playing method further includes:
monitoring the operation of the second terminal to obtain an operation record, and recording a screen of the second terminal to obtain screen recording data;
storing the operation record and the screen recording data;
and/or the presence of a gas in the gas,
before allowing the second terminal to play the video to be played, the video playing method further includes:
adding an image watermark containing user information and prompt information into a background image of the second terminal; and the user information is user identity information in an access address input by the second terminal.
With reference to the first aspect or the first, second, third, fourth, or fifth embodiment of the first aspect, in a sixth embodiment of the first aspect, the video playing method further includes:
after the second terminal plays the video to be played, if the second terminal accesses the video to be played again, verifying the access request of the second terminal again, and feeding back a new access address to the second terminal after the verification is passed; the access time information in the new access address includes time information that is verified based on the access request of the second terminal.
In a second aspect, an embodiment of the present invention provides a video playing system, where the playing system includes:
the request verification unit is used for feeding back an access address of the video to be played to the first terminal when an access request for accessing the video to be played sent by the first terminal passes verification; the access address includes: user identity information and access time information;
the access verification unit is used for verifying the authority of the second terminal through the user identity information and the access time information in the access address when the second terminal accesses the video to be played through the access address;
the playing unit is used for refusing the second terminal to play the video to be played when the authority verification of the second terminal is failed; and when the authority verification of the second terminal passes, allowing the second terminal to play the video to be played.
In a third aspect, an embodiment of the present invention provides an electronic device, including a processor, a communication interface, a memory, and a communication bus, where the processor and the communication interface complete communication between the memory and the processor through the communication bus;
a memory for storing a computer program;
the processor is configured to implement the video playing method according to any one of the embodiments of the first aspect when executing the program stored in the memory.
In a fourth aspect, an embodiment of the present invention provides a computer-readable storage medium, where the computer-readable storage medium stores one or more programs, and the one or more programs are executable by one or more processors to implement the video playing method described in any of the embodiments of the first aspect.
Compared with the prior art, the technical scheme of the invention has the following advantages: according to the scheme, when the access request for accessing the video to be played by any terminal passes the verification, an access address corresponding to the video to be played is generated and fed back to the terminal sending the access request, the confidentiality of the access address is guaranteed, when the access address of any terminal is received, the authority of the terminal is verified through the access address, whether the terminal is matched with the access address or not is determined, after the authority is verified, the terminal is allowed to access the video to be played, if the authority is not verified, the terminal is refused to access the video to be played, and the safety of the video to be played is improved.
Drawings
Fig. 1 is a schematic structural diagram of a system for implementing various embodiments of the present invention according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a video playing method according to another embodiment of the present invention;
fig. 3 is a schematic flow chart of a video playing method according to another embodiment of the present invention;
fig. 4 is a schematic flow chart of a video playing method according to another embodiment of the present invention;
fig. 5 is a schematic structural diagram of a video playing system according to another embodiment of the present invention;
fig. 6 is a schematic structural diagram of an electronic device according to yet another embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention.
As shown in fig. 1, a schematic structural diagram of a system provided in an embodiment of the present invention for implementing various embodiments of the present invention includes a terminal, where the terminal includes: a processor 1110 and a memory 1130, wherein the terminal may be a mobile terminal such as a mobile phone, a tablet computer, a notebook computer, a palmtop computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and a fixed terminal such as a digital TV, a desktop computer, and the like.
As shown in fig. 2, an embodiment of the present invention provides a video playing method. Referring to fig. 2, the playing method includes the following steps:
s11, when the access request for accessing the video to be played sent by the first terminal passes the verification, feeding back the access address of the video to be played to the first terminal; the access address includes: user identity information and access time information.
In this embodiment, when the terminal needs to play a video, the terminal needs to send a play request to the server, and after the server determines the identity of the terminal, the server feeds back corresponding video play information to the terminal, for example, feeds back a video play address to the terminal, or directly sends a video to the terminal.
In this embodiment, the first terminal may be any terminal, such as a mobile terminal, a tablet computer, a notebook computer, a palm computer, a Personal Digital Assistant (PDA), a Portable Media Player (PMP), a navigation device, a wearable device, a smart band, a pedometer, and a fixed terminal, such as a digital TV, a desktop computer, and the like, which is not particularly limited in this embodiment.
In the embodiment, when the access request of the video to be played sent by the first terminal is verified, and after the verification is passed, feeding back an access address of the video to be played to the first terminal, wherein the access address comprises user identity information and access time information, because the identity information of each user is unique, the access time of different terminals is difficult to be the same, therefore, the access time information can also be used as the identification information of the access address, in this embodiment, when the access request is verified, the access address including the user identity information and the access time information is generated, the access address can be used for a legal user to access the video to be played, and an illegal user cannot access the video to be played as long as the access address is not leaked, even if leakage occurs, an illegal user cannot reserve the address or continue to propagate the address due to timeliness of the address; and when a leak occurs, the identity of the leak is also revealed through the address and video content.
In this embodiment, the access request sent by the terminal may be a data acquisition instruction carrying terminal information, for example, in order to ensure the security of a video to be played in the present scheme, the access request may be limited to be a data acquisition instruction sent by a terminal from a specific IP or intranet, so as to avoid access by a terminal from an extranet or other address, or may be a data acquisition instruction sent by a terminal that logs in an account with a special authority.
And S12, when the second terminal accesses the video to be played through the access address, performing authority verification on the second terminal through the user identity information and the access time information in the access address.
In this embodiment, when any second terminal accesses the video to be played through the access address, the second terminal is subjected to authority check through the user identity information and the access time information in the access address, on one hand, if the user identity information included in the access address is inconsistent with the terminal corresponding to the second terminal, it can be stated that the second terminal sending the access address is not the terminal sending the access request before, and the authority check fails, on the other hand, it can be judged that the access address is legal through the access time information, for example, if an effective period is set for the access address, the access time information and the current access time can be used to judge whether the access address is still within the limited period, so as to perform the authority check, for example, when the access address is generated, the access time information of the access address is stored, when the second terminal accesses the video to be played through the access address, and determining whether the access address is a legal address through the access time information, and further determining whether the second terminal has the authority.
S13a, when the authority verification of the second terminal does not pass, refusing the second terminal to play the video to be played;
and S13b, when the authority of the second terminal passes the verification, allowing the second terminal to play the video to be played.
In this embodiment, when the authority check of the second terminal passes, the second terminal is allowed to access the video to be played and play the video to be played, and when the authority check fails, the second terminal is denied to play the video to be played.
In the embodiment, when the access request of the first terminal for accessing the video to be played passes the verification, an access address corresponding to the video to be played is generated, the access address comprises user identity information and access time information, the access address is fed back to the first terminal sending the access request, the confidentiality of the access address is guaranteed, when the access address of the second terminal is received, the authority of the second terminal is verified through the access address, whether the second terminal is matched with the access address or not is determined, when the authority verification of the second terminal passes, the second terminal is allowed to access the video to be played, the video to be played is guaranteed to be accessed by the legal second terminal, when the authority verification of the second terminal does not pass, the illegal access of the second terminal is denied, and the security of the video to be played is improved.
In this embodiment, in practical application, once a user exits using an access address or performs an operation of refreshing or reentering a page when the user accesses a video to be played through a correct access address, when the user reenters the page, the above scheme needs to be re-executed to obtain a new access address, so as to ensure data security of the video to be played, that is, when the user enters the page or refreshes a browser each time, a background management system generates a new access address and feeds back the new access address after the user passes verification.
As shown in fig. 3, in this embodiment, specifically, in S12, the performing the authority verification on the second terminal according to the user identity information and the access time information in the access address includes the following steps:
s21, comparing the user identity information in the access address with the user identity information of the second terminal, and judging whether the second terminal is the first terminal;
in this embodiment, the user identity information in the access address sent by the second terminal is compared with the valid user information of the video to be played, whether the second terminal can access the video to be played is judged according to whether the user identity information is consistent with the valid user information, and if the user identity information is consistent with the valid user information, the second terminal can access the video to be played, otherwise, the second terminal cannot access the video to be played.
And S22, judging whether the current access time exceeds the preset access time limit according to the current access time and the access time information in the access address.
In this embodiment, whether the preset access time limit is exceeded or not is determined according to the current access time and the access time information in the access address, and in this scheme, the preset access time limit may be an effective use limit set by a user, so that the second terminal can only access the video to be played within the effective use limit, thereby implementing access control on the video to be played.
And S23a, if the second terminal is not the first terminal, or the current access time exceeds the preset access time limit, the authority verification of the second terminal is not passed.
And S23b, if the second terminal is the first terminal and the current access time does not exceed the preset access time limit, the authority verification of the second terminal passes.
In this embodiment, when the user identity information of the second terminal is consistent with the user identity information of the access address, it is indicated that the second terminal is the first terminal, and when the current access time does not exceed the preset access time period, the permission check of the second terminal passes, and the second terminal can access the video to be played, otherwise, the permission check of the second terminal fails.
As shown in fig. 4, the step of feeding back the access address of the video to be played to the first terminal in S11 includes the following steps:
and S31, acquiring the user identity information and the access time stamp of the first terminal.
In this embodiment, when the access request of the video to be played passes verification, the user identity information and the access timestamp of the first terminal are obtained, so as to confirm the identity of the access request. The user identity information of the first terminal may be a terminal number of the first terminal or account information of an account logged in the first terminal, and the scheme is not particularly limited.
And S32, encrypting the access time stamp to obtain an encrypted signature.
In this embodiment, since the access timestamp is determined by the access time, the access timestamp is a random timestamp, and by encrypting the access timestamp, compared with encrypting the user identity information, the user identity information is relatively fixed, if an illegal user knows the generation rule of the access address, the access address can be directly generated, and the access timestamp is encrypted to generate an encrypted signature, so that the illegal user not only needs to know the access timestamp but also needs to know the encryption rule to obtain the encrypted signature, and thus, the access address has higher confidentiality.
And S33, generating an access address according to the user identity information and the encrypted signature.
In this embodiment, an access address is generated through the user identity information and the encrypted signature, and the access address is fed back to the terminal sending the access request, so that the terminal can access the corresponding video to be played through the access address.
In this embodiment, in combination with the embodiment shown in fig. 3, before the S13 performs the authority verification on the second terminal through the user identity information and the access time information in the access address, the method further includes the following steps: judging whether the access timestamp can be obtained by decrypting the encrypted signature in the access address; and if the encrypted signature can be decrypted to obtain the access timestamp, performing permission verification on the second terminal through the user identity information and the access time information in the access address.
In this embodiment, the encrypted signature in the access address is decrypted, after the access timestamp is obtained through decryption, the authority of the second terminal is checked, and if the access timestamp cannot be obtained through decryption, the access address can be directly considered invalid, and the second terminal is denied access to the video to be played, so that the data processing efficiency is improved.
In this embodiment, before allowing the second terminal to play the video to be played in S13, the playing method further includes the following steps: and when the authority verification of the second terminal passes, adding a video watermark including the user identity information in the video to be played according to the user identity information in the access address.
In this embodiment, when a video to be played is played, a video watermark is added to the video to be played, so that the value of the video to be played can be reduced even if the video to be played is illegally acquired, and meanwhile, if the watermark is not clear after an illegal user acquires the video to be played, the loss of the video can be traced through the video watermark including user identity information.
In this embodiment, adding a watermark to a video to be played or other pictures can be implemented in an existing manner, and this is not particularly limited in this embodiment.
In the embodiment, the watermark is pressed into the video and accelerated by the GPU card, the generated picture is directly pressed into each frame of the video by the following command, the speed is high because the watermark is added by the GPU hardware, and the time for pressing the watermark into the normal TV play for 45min is about 1-2 minutes after testing.
In the embodiment, the value of the video is reduced from the source by adding the watermark to the video to be played, so that the video acquired by a user by any means can contain the name of the user, the leaked video can be traced to a specific object, and the video cannot be watched by the watermark removing means existing on the market. The means for acquiring the video comprise direct downloading, mobile phone screen recording, software screen recording and the like.
In this embodiment, the playing method further includes: monitoring the operation of the second terminal to obtain an operation record, and recording a screen of the second terminal to obtain screen recording data; and storing the operation record and the screen recording data.
In this embodiment, the operation of the terminal is monitored to determine the operation record of the terminal, and the screen recording is performed on the terminal to obtain the screen recording data, so as to determine the operation condition of the terminal, store the operation record and the screen recording data in real time, determine whether the operation of the terminal is illegal or whether the user performs the operation of illegally acquiring the video, and ensure the security of the video to be played.
In this embodiment, each time the user plays the push video, the system will keep a record of the action, so that even the illegal action of the normal user can provide an alarm, for example, in a short time, the video is played (spread) frequently, and the video is suspected to be leaked.
In a specific embodiment, the video playing method further includes: adding an image watermark containing user information and prompt information into a background image of the second terminal; the user information is user identity information in an access address input by the second terminal, and may also be information such as a terminal number and an IP address of the second terminal.
In this embodiment, in addition to adding a watermark to the video to be played, an image watermark is also added to the background image of the terminal, so that a corresponding watermark also exists in the playing background of the video playing, and if an illegal user acquires the video to be played in a screen recording manner, the watermark in the background image is also recorded, so as to trace the source of the video, and the background image of the terminal is other display areas of the terminal when the video to be played is played in a small window.
In this embodiment, in order to prevent a user from illegally obtaining a video to be played through a terminal, the terminal may not have a USB interface, and meanwhile, the terminal may not perform data transmission.
In a specific embodiment, the video playing method further includes: after the second terminal plays the video to be played, if the second terminal accesses the video to be played again, verifying the access request of the second terminal again, and feeding back a new access address to the second terminal after the verification is passed; the access time information in the new access address includes time information that is authenticated based on the access request of the second terminal.
In this embodiment, if the second terminal passes the verification, after the video to be played is played, if the second terminal accesses the video to be played again, for example, the second terminal reenters the page of the video to be played, or the second terminal refreshes the playing page when the video to be played is played, at this time, the access request of the second terminal needs to be verified again, specifically, a new access address is fed back to the second terminal after the verification passes by referring to the verification process of the first terminal in the above embodiment, and by controlling the playing of the video to be played, each access address can only be used for accessing the playing page of the video to be played once, so that the risk of leakage of the video to be played is reduced.
As shown in fig. 5, an embodiment of the present invention provides a video playing system, where the video playing system includes: a request authentication unit 11, an access authentication unit 12, and a playback unit 13.
In this embodiment, the request verification unit 11 is configured to feed back, to the first terminal, an access address of the video to be played when an access request sent by the first terminal to access the video to be played passes verification; the access address includes: user identity information and access time information;
in this embodiment, the access verification unit 12 is configured to, when the second terminal accesses the video to be played through the access address, perform permission verification on the second terminal through the user identity information and the access time information in the access address;
in this embodiment, the playing unit 13 is configured to refuse the second terminal to play the video to be played when the authority check of the second terminal fails; and when the authority verification of the second terminal passes, allowing the second terminal to play the video to be played.
In this embodiment, the access verifying unit 12 is specifically configured to compare the user identity information in the access address with the user identity information of the second terminal, and determine whether the second terminal is the first terminal; judging whether the current access time exceeds the preset access time limit or not according to the current access time and the access time information in the access address; if the second terminal is not the first terminal, or the current access time exceeds the preset access time limit, the authority verification of the second terminal is not passed; and if the second terminal is the first terminal and the current access time does not exceed the preset access time limit, the authority verification of the second terminal passes.
In this embodiment, the request verification unit 11 is specifically configured to obtain user identity information and an access timestamp of the first terminal; encrypting the access timestamp to obtain an encrypted signature; and generating an access address according to the user identity information and the encrypted signature.
In this embodiment, the playing system further includes: the decryption unit is used for decrypting the encrypted signature in the access address and judging whether the access timestamp can be obtained through decryption; and if the encrypted signature can be decrypted to obtain the access timestamp, performing permission verification on the second terminal through the user identity information and the access time information in the access address.
In this embodiment, the playing system further includes: and the watermark adding unit is used for adding the video watermark comprising the user identity information in the video to be played according to the user identity information in the access address when the authority verification of the second terminal passes.
In this embodiment, the playing system further includes: the recording unit is used for monitoring the operation of the terminal to obtain an operation record and recording the screen of the terminal to obtain screen recording data; and storing the operation record and the screen recording data.
In this embodiment, the watermark adding unit is further configured to add an image watermark including user information and prompt information to a background image of the terminal; the user information is identity information of a user operating the terminal.
In this embodiment, the request verification unit 11 is further configured to, after the second terminal plays the video to be played, if the second terminal accesses the video to be played again, verify the access request of the second terminal again, and feed back a new access address to the second terminal after the verification is passed; the access time information in the new access address includes time information that is authenticated based on the access request of the second terminal.
The functions of the apparatus in the embodiment of the present invention have been described in the above method embodiments, so that reference may be made to the related descriptions in the foregoing embodiments for details that are not described in the present embodiment, and further details are not described herein.
As shown in fig. 6, an embodiment of the present invention provides an electronic device, which includes a processor 1110, a communication interface 1120, a memory 1130, and a communication bus 1140, wherein the processor 1110, the communication interface 1120, and the memory 1130 complete communication with each other through the communication bus 1140;
a memory 1130 for storing computer programs;
the processor 1110 is configured to implement any of the video playing methods described above when executing the program stored in the memory 1130.
In the electronic device provided by the embodiment of the present invention, when the access request for the first terminal to access the video to be played is verified by executing the program stored in the memory 1130 by the processor 1110, generating an access address corresponding to the video to be played, wherein the access address comprises user identity information and access time information, feeding the access address back to the first terminal sending the access request to ensure the confidentiality of the access address, when receiving the access address of the second terminal, verifying the authority of the second terminal through the access address, determining whether the second terminal and the access address are matched, when the authority of the second terminal passes the verification, the second terminal is allowed to access the video to be played to ensure that the video to be played can be accessed by the legal second terminal, and when the authority verification of the second terminal fails, the illegal access of the second terminal is refused, so that the safety of the video to be played is improved.
The communication bus 1140 mentioned in the above electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus 1140 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface 1120 is used for communication between the electronic device and other devices.
The memory 1130 may include a Random Access Memory (RAM) 1130, and may also include a non-volatile memory 1130, such as at least one disk memory 1130. Optionally, the memory 1130 may also be at least one memory device located remotely from the processor 1110.
The processor 1110 may be a general-purpose processor 1110, and includes a Central Processing Unit (CPU) 1110, a Network Processor (NP) 1110, and the like; the device may also be a digital signal processor 1110 (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic device, or discrete hardware components.
Embodiments of the present invention provide a computer-readable storage medium, which stores one or more programs, where the one or more programs are executable by one or more processors 1110 to implement the video playing method of any of the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the invention are brought about in whole or in part when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk (ssd)), among others.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. A video playing method, the playing method comprising:
when an access request for accessing a video to be played sent by a first terminal passes verification, feeding back an access address of the video to be played to the first terminal; the access address includes: user identity information and access time information;
when a second terminal accesses the video to be played through the access address, authority verification is carried out on the second terminal through user identity information in the access address and the access time information;
when the authority verification of the second terminal is failed, refusing the second terminal to play the video to be played;
and when the authority verification of the second terminal passes, allowing the second terminal to play the video to be played.
2. The video playing method according to claim 1, wherein the performing the permission check on the second terminal through the user identity information in the access address and the access time information comprises:
comparing the user identity information in the access address with the user identity information of the second terminal, and judging whether the second terminal is the first terminal;
judging whether the current access time exceeds the preset access time limit or not according to the current access time and the access time information in the access address;
if the second terminal is not the first terminal, or the current access time exceeds the preset access time limit, the permission verification of the second terminal is not passed;
and if the second terminal is the first terminal and the current access time does not exceed the preset access time limit, the permission of the second terminal passes the verification.
3. The video playing method according to claim 1, wherein the feeding back the access address of the video to be played to the first terminal includes:
acquiring user identity information and an access timestamp of the first terminal;
encrypting the access timestamp to obtain an encrypted signature;
and generating the access address according to the user identity information and the encrypted signature.
4. The video playing method according to claim 3, wherein before the performing the permission check on the second terminal through the user identity information in the access address and the access time information, the method further comprises:
judging whether the access timestamp can be obtained by decrypting the encrypted signature in the access address;
and if the encrypted signature can be decrypted to obtain the access timestamp, performing permission verification on the second terminal through the user identity information and the access time information in the access address.
5. The video playing method according to claim 1, wherein before allowing the second terminal to play the video to be played, the playing method further comprises:
and when the authority verification of the second terminal passes, adding a video watermark including the user identity information in the video to be played according to the user identity information in the access address.
6. The video playback method according to claim 1, wherein the playback method further comprises:
monitoring the operation of the second terminal to obtain an operation record, and recording a screen of the second terminal to obtain screen recording data;
storing the operation record and the screen recording data;
and/or the presence of a gas in the gas,
before allowing the second terminal to play the video to be played, the video playing method further includes:
adding an image watermark containing user information and prompt information into a background image of the second terminal; and the user information is user identity information in an access address input by the second terminal.
7. The video playback method according to any one of claims 1 to 6, wherein the video playback method further comprises:
after the second terminal plays the video to be played, if the second terminal accesses the video to be played again, verifying the access request of the second terminal again, and feeding back a new access address to the second terminal after the verification is passed; the access time information in the new access address includes time information that is verified based on the access request of the second terminal.
8. A video playback system, the playback system comprising:
the request verification unit is used for feeding back an access address of the video to be played to the first terminal when an access request for accessing the video to be played sent by the first terminal passes verification; the access address includes: user identity information and access time information;
the access verification unit is used for verifying the authority of the second terminal through the user identity information and the access time information in the access address when the second terminal accesses the video to be played through the access address;
the playing unit is used for refusing the second terminal to play the video to be played when the authority verification of the second terminal is failed; and when the authority verification of the second terminal passes, allowing the second terminal to play the video to be played.
9. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the video playback method according to any one of claims 1 to 7 when executing the program stored in the memory.
10. A computer-readable storage medium storing one or more programs, the one or more programs being executable by one or more processors to implement the video playback method of any one of claims 1 to 7.
CN202111028242.8A 2021-09-02 2021-09-02 Video playing method, system, electronic equipment and storage medium Pending CN113923482A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111028242.8A CN113923482A (en) 2021-09-02 2021-09-02 Video playing method, system, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111028242.8A CN113923482A (en) 2021-09-02 2021-09-02 Video playing method, system, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113923482A true CN113923482A (en) 2022-01-11

Family

ID=79233892

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111028242.8A Pending CN113923482A (en) 2021-09-02 2021-09-02 Video playing method, system, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113923482A (en)

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120015998A (en) * 2010-08-12 2012-02-22 아이브스테크놀러지(주) Intelligent video surveillance system and method using integrated platform architecture
WO2016141856A1 (en) * 2015-03-07 2016-09-15 华为技术有限公司 Verification method, apparatus and system for network application access
US20170171615A1 (en) * 2015-12-15 2017-06-15 Le Holdings (Beijing) Co., Ltd. Method and Electronic Device for Controlling Video Playing
WO2017215514A1 (en) * 2016-06-14 2017-12-21 深圳创维数字技术有限公司 Audio/video encrypted playing method and system thereof
CN108446543A (en) * 2018-02-07 2018-08-24 北京明朝万达科技股份有限公司 A kind of email processing method, system and mail proxy gateway
CN109657429A (en) * 2018-09-27 2019-04-19 深圳壹账通智能科技有限公司 Video resource management method, equipment, system and computer readable storage medium
CN109828810A (en) * 2018-12-28 2019-05-31 北京达佳互联信息技术有限公司 Screen shots intercept method, watermark adding method, device, equipment and medium
WO2019153433A1 (en) * 2018-02-09 2019-08-15 网宿科技股份有限公司 Secret key providing method, video playback method, server and client
CN110248215A (en) * 2019-05-22 2019-09-17 福建大屏网络科技有限公司 Video playing chain method for authenticating, device, system, server and storage medium
CN110691087A (en) * 2019-09-29 2020-01-14 北京搜狐新媒体信息技术有限公司 Access control method, device, server and storage medium
CN111405223A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Video processing method, device and equipment
CN112154638A (en) * 2019-04-29 2020-12-29 谷歌有限责任公司 System and method for distributed verification of online identity
CN112261012A (en) * 2020-09-30 2021-01-22 北京鸿联九五信息产业有限公司 Browser, server and webpage access method
CN112583607A (en) * 2020-12-22 2021-03-30 珠海格力电器股份有限公司 Equipment access management method, device, system and storage medium
CN112953905A (en) * 2021-01-27 2021-06-11 湖南快乐阳光互动娱乐传媒有限公司 Data transmission method, system and server equipment
CN112954403A (en) * 2019-11-26 2021-06-11 腾讯科技(深圳)有限公司 Video encryption method, device, equipment and storage medium

Patent Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20120015998A (en) * 2010-08-12 2012-02-22 아이브스테크놀러지(주) Intelligent video surveillance system and method using integrated platform architecture
WO2016141856A1 (en) * 2015-03-07 2016-09-15 华为技术有限公司 Verification method, apparatus and system for network application access
US20170171615A1 (en) * 2015-12-15 2017-06-15 Le Holdings (Beijing) Co., Ltd. Method and Electronic Device for Controlling Video Playing
WO2017215514A1 (en) * 2016-06-14 2017-12-21 深圳创维数字技术有限公司 Audio/video encrypted playing method and system thereof
CN108446543A (en) * 2018-02-07 2018-08-24 北京明朝万达科技股份有限公司 A kind of email processing method, system and mail proxy gateway
WO2019153433A1 (en) * 2018-02-09 2019-08-15 网宿科技股份有限公司 Secret key providing method, video playback method, server and client
CN109657429A (en) * 2018-09-27 2019-04-19 深圳壹账通智能科技有限公司 Video resource management method, equipment, system and computer readable storage medium
CN109828810A (en) * 2018-12-28 2019-05-31 北京达佳互联信息技术有限公司 Screen shots intercept method, watermark adding method, device, equipment and medium
CN111405223A (en) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 Video processing method, device and equipment
CN112154638A (en) * 2019-04-29 2020-12-29 谷歌有限责任公司 System and method for distributed verification of online identity
CN110248215A (en) * 2019-05-22 2019-09-17 福建大屏网络科技有限公司 Video playing chain method for authenticating, device, system, server and storage medium
CN110691087A (en) * 2019-09-29 2020-01-14 北京搜狐新媒体信息技术有限公司 Access control method, device, server and storage medium
CN112954403A (en) * 2019-11-26 2021-06-11 腾讯科技(深圳)有限公司 Video encryption method, device, equipment and storage medium
CN112261012A (en) * 2020-09-30 2021-01-22 北京鸿联九五信息产业有限公司 Browser, server and webpage access method
CN112583607A (en) * 2020-12-22 2021-03-30 珠海格力电器股份有限公司 Equipment access management method, device, system and storage medium
CN112953905A (en) * 2021-01-27 2021-06-11 湖南快乐阳光互动娱乐传媒有限公司 Data transmission method, system and server equipment

Similar Documents

Publication Publication Date Title
CN112333198B (en) Secure cross-domain login method, system and server
JP5626816B2 (en) Method and apparatus for partial encryption of digital content
US9325680B2 (en) Digital rights management retrieval system
CN104837035A (en) Video playing method and terminal
CN104427358A (en) Fast-expiring licenses used to speculatively authorize access to streaming media content
CN112507291B (en) Method and device for generating unique identifier of Android device
US20140090075A1 (en) Flexible content protection system using downloadable drm module
CN110011950B (en) Authentication method and device for video stream address
CN109151506B (en) Method, system and server for operating video file
CN106033503A (en) Method, device and system of online writing application secret key into digital content equipment
CN113411638A (en) Video file playing processing method and device, electronic equipment and storage medium
CN107145769A (en) A kind of digital rights management method about DRM, equipment and system
CN115277143B (en) Data security transmission method, device, equipment and storage medium
WO2019001084A1 (en) Authentication method and device for video stream address
CN110445768B (en) Login method and device and electronic equipment
US20120109784A1 (en) Method and system for automating protection of media files for download
CN108235067B (en) Authentication method and device for video stream address
CN117375986A (en) Application access method, device and server
US11151228B2 (en) Blockchain-based image transaction system, method, apparatus, and electronic device
US20150012746A1 (en) Detecting user presence on secure in-band channels
CN111182010B (en) Local service providing method and device
CN113923482A (en) Video playing method, system, electronic equipment and storage medium
CN108965939B (en) Media data processing method, device and system and readable storage medium
KR20090054110A (en) Method and apparatus for obtaining right objects of contents in a mobile terminal
CN112770144A (en) Video file downloading method, video file playing method, video file downloading device and terminal equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination