TWI640194B - Content delivery network audio and video service anti-theft connection method - Google Patents
Content delivery network audio and video service anti-theft connection method Download PDFInfo
- Publication number
- TWI640194B TWI640194B TW106112717A TW106112717A TWI640194B TW I640194 B TWI640194 B TW I640194B TW 106112717 A TW106112717 A TW 106112717A TW 106112717 A TW106112717 A TW 106112717A TW I640194 B TWI640194 B TW I640194B
- Authority
- TW
- Taiwan
- Prior art keywords
- token
- cache server
- player
- video
- user
- Prior art date
Links
Landscapes
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
本發明係有關一種內容傳遞網路之影音服務防盜連方法,主要係利用驗證字串(Token)及週期查驗技術,判別存取CDN(Content delivery network,內容傳遞網路)影音服務的客戶端資源請求是否為網路盜連,於使用者欲存取CDN資源時,需先依據欲存取的資源URL、時間及UID資訊,產生正確的Token供服務節點驗證,驗證通過後,CDN系統才會遞送相應的資源,於查驗時段,服務節點會針對每個網路請求(Request),遞送子網路請求(Sub-Request)至資源納管伺服器,由該伺服器統計Token-IP對應資訊,進而判別是否為盜連者,且將盜連者的Token更新至黑名單中,禁止存取;於非查驗時段,服務節點則會依據該Token,至黑名單中查找是否為黑名單成員,若為真,則會直接禁止該次資源請求。 The invention relates to a video service anti-theft connection method for a content delivery network, which mainly utilizes a verification token (Token) and a periodic inspection technology to discriminate and access a client resource of a CDN (Content Delivery Network) video and audio service. Whether the request is a network hacking or not, when the user wants to access the CDN resource, the user must first generate a correct Token for the service node to verify according to the resource URL, time and UID information to be accessed, and the CDN system will be verified after the verification is passed. Delivering corresponding resources, during the verification period, the service node will deliver a Sub-Request to the resource management server for each network request, and the server counts the Token-IP corresponding information. Further, it is determined whether it is a pirate, and the Token of the pirate is updated to the blacklist, and access is prohibited; during the non-checking period, the service node searches the blacklist for the blacklist member according to the token. If true, the resource request will be directly banned.
Description
本發明係有關一種影音服務防盜連的方法,尤指一種網路存取與CDN(Content delivery network,內容傳遞網路)內容遞送處理技術,利用驗證字串及週期查驗,分析並判別出非法盜連者,幫助維運業者找到非法連線,禁用、並建立黑名單,以屏除非法盜連,達到降低CDN系統服務負擔的內容傳遞網路之影音服務防盜連方法。 The invention relates to a method for anti-theft connection of audio and video services, in particular to a network access and content delivery network (CDN) content delivery processing technology, which utilizes verification strings and periodic inspections to analyze and identify illegal pirates. In addition, it helps the operators to find illegal connections, disable and establish blacklists, and to block the video and audio services of the content delivery network that reduces the burden of the CDN system.
一般人普遍認為從網路抓下盜版電影、影集、音樂檔案,存在個人的電腦或傳給他人,是違法的,但並不知道透過LINE等社群軟體及其他途徑傳送盜版影音網路連結或透過連結觀看盜版影音,雖然沒有直接傳送或下載檔案檔案同樣也屬於違法行為。 It is generally believed that it is illegal to collect pirated movies, albums, music files from the Internet, or to have personal computers or pass them on to others. However, it is not known to transmit pirated video and audio networks through LINK and other social software and other channels. Linking to watch pirated video and audio, although it is illegal to not directly transfer or download the file.
然而法律雖有明定傳送盜版影音網路連結或透過連結觀看盜版影音為違法行為,但是,由於觀看及傳送連結的人數眾多,如果真要抓違法,不僅人數龐大,技術上也很困難。試想,串流影音傳送時是極多段的破碎訊號,曾一段段暫存在網友電腦上,看完就不見了,如果要動用到高科技的設備及技術來查一位家庭主婦是否看了盜版韓劇,其成本極高。 However, although it is illegal for the law to transmit pirated video and audio network links or to watch pirated video and audio through links, it is not only a large number but also technically difficult to arrest illegally because of the large number of people watching and transmitting links. Imagine that the streaming video and audio transmission is a lot of broken signals. It has been temporarily stored on the netizen computer. After reading it, it will disappear. If you want to use high-tech equipment and technology to check whether a housewife has seen pirated Korean drama. The cost is extremely high.
因此,美國專利US6941368號專利「Protecting resource URLs from being served without a base web page」提供一種記錄使用者來源IP,統計重複資 訊,作為判斷盜連的依據,然而,此專利所提供的方法對於NAT服務下的使用者(亦即共用同一個Public IP),無法辨別,導致資源鏈結會被同一個NAT IP的使用者盜連。 Therefore, US Patent No. 6,941,368 "Protecting resource URLs from being served without a base web page" provides a record of user source IP, statistical duplicate capital As a basis for judging theft, however, the method provided by this patent is indistinguishable to users under the NAT service (that is, sharing the same Public IP), resulting in the resource link being used by the same NAT IP user. Pirates.
而美國專利US20090217354號專利「Controlling access of a client system to access protected remote resources supporting relative URLs」提供一種透過使用者登入資訊,來達成防止盜連之目的,但該專利案在使用者登入後,該站站的相關資源皆可存取,因此盜連者可透過一次合法的登入來完全存取該站的資源; 由此可見,目前習知之技術與方法均無法有效抑制盜連行為,而亟待加以改良,有鑑於此,本發明乃針對上述需求,積極研究加以改良創新,研發完成本件內容傳遞網路之影音服務防盜連方法。 The US Patent No. US20090217354 "Controlling access of a client system to access protected remote resources supporting relative URLs" provides a means of preventing fraudulent use through user login information, but the patent is located after the user logs in. The relevant resources of the station are accessible, so the pirate can fully access the resources of the station through a legal login; It can be seen that the conventional techniques and methods are not effective in suppressing the piracy, and need to be improved. In view of the above, the present invention actively studies and improves the innovation and research and development of the audio-visual service of the content delivery network. Anti-theft connection method.
本發明之一目的係在於提供一種可幫助維運業者迅速辨別出非法盜連者,並屏除該使用者繼續存取CDN系統資源的內容傳遞網路之影音服務防盜連方法。 One object of the present invention is to provide a video service anti-theft connection method that can help a carrier to quickly identify an illegal pirate and remove the content delivery network from which the user continues to access the CDN system resources.
本發明之另一目的係在於提供一種透過透過驗證字串以及查驗階段,來辨別非法盜連者的內容傳遞網路之影音服務防盜連方法。 Another object of the present invention is to provide a video service anti-theft connection method for discriminating an illegal pirate's content delivery network by transmitting a verification string and an inspection stage.
本發明之又一目的係在於提供一種於接收到每個網路資源存取請求時,驗證使用者所帶進來的驗證字串是否合法,來決定是否放行資源的內容傳遞網路之影音服務防盜連方法。 Another object of the present invention is to provide an audio-visual service anti-theft device for verifying whether a verification string brought in by a user is legitimate when receiving a request for each network resource access. Even the method.
本發明之再一目的係在於提供一種於查驗階段,統計各別驗證字串與存取IP的對應數量,進而辨別出分享URL的盜連行為的內容傳遞網路之影音服務防盜連方法。 A further object of the present invention is to provide an audio-visual service anti-theft method for the content delivery network that distinguishes the corresponding verification string and the access IP in the verification phase, and then discriminates the sharing behavior of the URL.
為達成上述目的,本發明內容傳遞網路之影音服務防盜連方法係依據網路請求(Request)所帶入的驗證字串,判別是否透過正確之演算法產生,來決定該次資源請求是否可以正常存取CDN網路影音資源,且在查驗時段,服務節點會依據每個Request遞送一個Sub-Request至資源納管伺服器,由該伺服器統計分析,回應該Request是否為非法盜連,並將黑名單資訊同步至服務節點,而於非查驗時段,服務節點則可依據黑名單,直接阻擋非法盜連者的內容傳遞網路之影音服務防盜連方法。 In order to achieve the above object, the audio-visual service anti-theft connection method of the delivery network of the present invention determines whether the resource request can be made according to the verification string brought by the network request (Request), whether or not the correct algorithm is generated. The CDN network audio and video resources are normally accessed, and during the verification period, the service node delivers a Sub-Request to the resource management server according to each Request, and the server statistically analyzes whether the Request is illegally stolen, and The blacklist information is synchronized to the service node, and during the non-checking period, the service node can directly block the anti-theft method of the audio-visual service of the content communication network of the illegal pirate according to the blacklist.
S11~S16‧‧‧步驟流程 S11~S16‧‧‧Step process
S21~S28‧‧‧步驟流程 S21~S28‧‧‧Step process
圖1係為本發明內容傳遞網路之影音服務防盜連方法之流程圖;圖2係為本發明快取伺服器判斷影音片段驗證字串(token)是否合法之流程圖。 1 is a flow chart of a method for preventing audio-visual service of a content delivery network according to the present invention; and FIG. 2 is a flow chart of determining whether a video card authentication token (legal) is legal according to the cache server of the present invention.
以下將描述具體之實施例以說明本發明之實施態樣,惟其並非用以限制本發明所欲保護之範疇:請參閱圖1,本發明內容傳遞網路之影音服務防盜連方法,其步驟包括:S11:播放器與時間伺服器同步; S12:播放器依據時間因子,產生驗證UID;S13:播放器請求播放指定m3u8-url之影片至快取伺服器,且包含UID做快取伺服器驗證之用;S14:快取伺服器驗證UID的合法性,遞送包含多個影音片段(*.ts)URL的播放列表給播放器;S15:播放器依據UID及ts-url,產生影音片段驗證碼(token),遞送給快取伺服器;S16:快取伺服器依據token,判別合法性,並遞送影音片段。 The specific embodiments of the present invention are described below to illustrate the embodiments of the present invention, but are not intended to limit the scope of the present invention to be protected: Referring to FIG. 1, the content of the present invention is a video service security connection method, and the steps thereof include :S11: The player is synchronized with the time server; S12: the player generates a verification UID according to the time factor; S13: the player requests to play the specified m3u8-url movie to the cache server, and includes the UID for the cache server verification; S14: the cache server verifies the UID Legitimate, delivering a playlist containing a plurality of video clips (*.ts) URLs to the player; S15: the player generates a video clip verification code (token) according to the UID and ts-url, and delivers to the cache server; S16: The cache server determines the legality according to the token, and delivers the video clip.
其中,步驟S11為播放器與國家時間伺服器同步,且快取伺服器也進行時間同步,執行主因在於、步驟S12中,播放器與快取伺服器皆透過時間因子產生UID(user identifier,用戶ID)並透過該UID於步驟S15驗證token(影音片段驗證字串)合法性。 Step S11 is that the player synchronizes with the national time server, and the cache server also performs time synchronization. The main reason for execution is that in the step S12, both the player and the cache server generate a UID (user identifier) through the time factor. ID) and verify the legitimacy of the token (video clip verification string) through the UID in step S15.
本實施例中播放器透過NTP(Networlk Time Protocol,網路時間協議)與時間伺服器網域time.stdtime.gov.tw進行時間同步,於此之前,CDN系統中每個服務節點皆已完成時間同步。 In this embodiment, the player synchronizes time with the time server domain time.stdtime.gov.tw through NTP (Networlk Time Protocol). Before this, each service node in the CDN system has completed the time. Synchronize.
步驟S12產生UID的參數為m3u8-url以及請求播放起始時間(StartTime),其公式為:Hash(M3U8+StartTime)。 Step S12 generates a UID parameter of m3u8-url and a request playback start time (StartTime), and the formula is: Hash (M3U8+StartTime).
本實施例中使用者欲播放某影片,如表一所示,其網址為http://www.cht.com.tw/video/1.m3u8,代表為m3u8-url;播放起始時間為2016/10/19_08:09:33.537,格式為[年/月/日_時:分:秒.毫秒],代表為StartTime;所以UID為Hash(m3u8-url+Start),Hash可以採用MD5,且結果為32位元。以此 案例則為Hash(http://www.cht.com.tw/video/1.m3u8 2016/10/19_08:09:33.537),假想的UID為:ABCDEFGHIJKLMNOPQRSTUV0123456789。 In this embodiment, the user wants to play a certain movie, as shown in Table 1, the website address is http://www.cht.com.tw/video/1.m3u8, and the representative is m3u8-url; the playing start time is 2016. /10/19_08:09:33.537, the format is [year/month/day_hour:minute:second.millisecond], which is represented as StartTime; so UID is Hash(m3u8-url+Start), Hash can adopt MD5, and the result is It is 32 bits. With this The case is Hash (http://www.cht.com.tw/video/1.m3u8 2016/10/19_08:09:33.537), and the hypothetical UID is: ABCDEFGHIJKLMNOPQRSTUV0123456789.
步驟S13中播放器對快取伺服器發出請求取得某部影片(以m3u8-url形式呈現)的影音片段列表(play-list),包含之UID為S12所產生。 In step S13, the player requests the cache server to obtain a video clip list (play-list) of a certain movie (presented in the form of m3u8-url), and the UID is generated by S12.
本實施例中遞送m3u8-url需求,參數包含UID、StartTime,以GET的形式表現為:http://m3u8url?UID=XXX&StartTime=XXX,其中,m3u8url為www.cht.com.tw/video/1.m3u8;UID為ABCDEFGHIJKLMNOPQRSTUV0123456789;StartTime為2016/10/19_08:09:33.537,故,最後送出需求的網址以GET的形式表現為:http://www.cht.com.tw/video/1.m3u8? UID=ABCDEFGHIJKLMNOPQRSTUV0123456789& StartTime=2016/10/19_08:09:33.537 In this embodiment, the m3u8-url requirement is delivered, and the parameter includes UID, StartTime, and is expressed in the form of GET: http://m3u8url? UID=XXX&StartTime=XXX, where m3u8url is www.cht.com.tw/video/1.m3u8; UID is ABCDEFGHIJKLMNOPQRSTUV0123456789; StartTime is 2016/10/19_08:09:33.537, so the last URL to be sent is GET The form is: http://www.cht.com.tw/video/1.m3u8? UID=ABCDEFGHIJKLMNOPQRSTUV0123456789& StartTime=2016/10/19_08:09:33.537
步驟S14快取伺服器透過m3u8-url、StartTime的參數,經過Hash後產生的UID’,並判別是否與播放器遞送的UID相同。如果合法,則將play-list回傳給播放器。 Step S14: The cache server passes the parameters of m3u8-url and StartTime, passes the UID' generated after the hash, and determines whether it is the same as the UID delivered by the player. If it is legal, the play-list is passed back to the player.
本實施例中快取伺服器從S13中取得m3u8-url、UID以及StartTime三項參數,以S12的公式計算出UID’,並判別其結果是否與播放器提供的UID相同。以此例中,快取伺服器取得:m3u8-url為http://www.cht.com.tw/video/1.m3u8 StartTime為2016/10/19_08:09:33.537 UID(播放器提供的)為ABCDEFGHIJKLMNOPQRSTUV0123456789,透過Hash(m3u8-url+Start)計算出驗證用UID’為ABCDEFGHIJKLMNOPQRSTUV0123456789。 In this embodiment, the cache server obtains three parameters of m3u8-url, UID, and StartTime from S13, calculates UID' by the formula of S12, and determines whether the result is the same as the UID provided by the player. In this example, the cache server obtains: m3u8-url is http://www.cht.com.tw/video/1.m3u8 StartTime is 2016/10/19_08:09:33.537 UID (provided by the player) For ABCDEFGHIJKLMNOPQRSTUV0123456789, the verification UID' is calculated as ABCDEFGHIJKLMNOPQRSTUV0123456789 through Hash (m3u8-url+Start).
相比較UID與UID’相同,故將包含影音片段(*.ts)的播放列表(play-list)給播放器: The UID is the same as the UID', so the play-list containing the video clip (*.ts) is given to the player:
http://www.cht.com.tw/video/1.ts Http://www.cht.com.tw/video/1.ts
http://www.cht.com.tw/video/2.ts Http://www.cht.com.tw/video/2.ts
http://www.cht.com.tw/video/3.ts Http://www.cht.com.tw/video/3.ts
http://www.cht.com.tw/video/4.ts Http://www.cht.com.tw/video/4.ts
http://www.cht.com.tw/video/5.ts Http://www.cht.com.tw/video/5.ts
… ...
步驟S15播放器欲取得某一影音片段,則需產生驗證字串(Token),依據參數UID、ts-url以及當下時間(Time)精準到十秒,產生公式為:Hash(UID+TS+Time)。 Step S15: To obtain a certain video clip, the player needs to generate a verification token (Token) according to the parameter UID, ts-url and the current time (Time) to a precision of ten seconds, and the formula is: Hash (UID+TS+Time) ).
本實施例中播放器從S14取得play-list後,欲取得第一個影音片段http://www.cht.com.tw/video/1.ts,於需求當下的時間預想為2016/10/19_08:10:25.943,考量到網路遞送的基本耗時,此處時間參數僅精細到十秒:2016/10/19_08:10:25.943=>2016/10/19_08:10:2,並產生驗證字串 (Token),其公式為Hash(UID+tsurl+Time),Hash可以採用MD5,且結果為32位元。以GET的形式表現為:http://tsurl?UID=XXX& &Token=XXX In this embodiment, after the player obtains the play-list from S14, the first video clip http://www.cht.com.tw/video/1.ts is obtained, and the time required for the moment is expected to be 2016/10/ 19_08:10:25.943, considering the basic time spent on network delivery, here the time parameter is only fine to ten seconds: 2016/10/19_08:10:25.943=>2016/10/19_08:10:2, and generate verification String (Token), the formula is Hash (UID + tsurl + Time), Hash can use MD5, and the result is 32 bits. Expressed in the form of GET: http://tsurl? UID=XXX& &Token=XXX
其中,Time並不帶入在此URL-GET中;這也就是雙方面都需先與時間伺服器同步的原因(S11);非法盜連者也無法透過封包擷取,直接取得Time的資訊。以此例中,如表二所示:UID為ABCDEFGHIJKLMNOPQRSTUV0123456789 tsurl為http://www.cht.com.tw/video/1.ts Time為2016/10/19_08:10:2 Token為Hash(UID+tsurl+Time),所以套入上述參數則為:Hash(ABCDEFGHIJKLMNOPQRSLUV0123456789 http://www.cht.com.tw/video/1.ts 2016/10/19_08:10:2),其預想Token結果為0123456789VUTSRQPONMLKJIHGFEDCBA。 Among them, Time is not brought into this URL-GET; this is the reason why both parties need to synchronize with the time server first (S11); illegal pirates can not obtain the information of Time directly through the packet. In this example, as shown in Table 2: UID is ABCDEFGHIJKLMNOPQRSTUV0123456789 tsurl is http://www.cht.com.tw/video/1.ts Time is 2016/10/19_08:10:2 Token is Hash (UID+ Tsurl+Time), so the above parameters are: Hash (ABCDEFGHIJKLMNOPQRSLUV0123456789 http://www.cht.com.tw/video/1.ts 2016/10/19_08:10:2), its expected Token result is 0123456789VUTSRQPONMLKJIHGFEDCBA .
故,最後送出、以GET形式表現為:http://www.cht.com.tw/video/1.ts? UID=ABCDEFGHIJKLMNOPQRSTUV0123456789& Token=0123456789VUTSRQPONMLKJIHGFEDCBA Therefore, the final delivery, in the form of GET: http://www.cht.com.tw/video/1.ts? UID=ABCDEFGHIJKLMNOPQRSTUV0123456789& Token=0123456789VUTSRQPONMLKJIHGFEDCBA
步驟S16快取伺服器接收到請求後,依據不同時段,判別其token之合法性,如果通過,則會遞送播放器所要求之影音片段。同時段代表當下是否為查驗階段;如圖2所示,非查驗時段為S21、S22、S23、S24,查驗時段則為S21、S25、S26、S27、S28。 Step S16: After receiving the request, the cache server discriminates the legitimacy of the token according to different time periods, and if passed, delivers the video clip requested by the player. At the same time, the segment represents whether the current is the inspection phase; as shown in Fig. 2, the non-verification period is S21, S22, S23, S24, and the inspection period is S21, S25, S26, S27, S28.
其中,步驟S21是否為查驗時段:由快取伺服器判別當下是否為查驗時段,每N秒觸發一次,每次M秒;於該時段內,快取伺服器每接收到一個播放器之影音片段請求時,都會發送子需求(sub-requets)至資源納管伺服器。資源納管伺服器會統計每個token被幾個不同IP存取過(token-ip對應表),當同一token被超過C個IP存取後,則會判斷為盜連事件,並更新黑名單成員至快取伺服器。其判別結果,如果不是查驗時段走s22,如果是則走s25。 Wherein, step S21 is a verification period: the cache server determines whether the current time is the inspection period, and triggers every N seconds, each time M seconds; during this period, the cache server receives a video clip of each player. When requested, sub-requets are sent to the resource manager server. The resource management server will count that each token is accessed by several different IPs (token-ip correspondence table). When the same token is accessed by more than C IP addresses, it will determine the stolen event and update the blacklist. Member to cache server. The result of the discrimination is s22 if it is not the inspection period, and s25 if it is.
本實施例中快取伺服器每1800秒(N)觸發一次查驗時段,每次60秒(M),快取伺服器發送子需求(sub-request)給資源納管伺服器。如表三所示,經資源納管伺服器判別,如果某一Token(ex.0123456789VUTSRQPONMLKJIHGFEDCBA,可參考S15)同時被5個IP存取(C):此時,就可判斷該Token(0123456789VUTSRQPONMLKJIHGFEDCBA)為盜連情形。 In this embodiment, the cache server triggers a check period every 1800 seconds (N) for 60 seconds (M), and the cache server sends a sub-request to the resource management server. As shown in Table 3 , it is judged by the resource management server that if a Token (ex.0123456789VUTSRQPONMLKJIHGFEDCBA, refer to S15) is simultaneously accessed by 5 IPs (C): At this time, it can be judged that the Token (0123456789VUTSRQPONMLKJIHGFEDCBA) is Theft situation.
步驟S22該token是否為黑名單成員:快取伺服器會驗證該Token是否為黑名單成員,其黑名單成員以token形式存在,亦即s15所產生之驗證字串。 In step S22, the token is a blacklist member: the cache server verifies whether the token is a blacklist member, and the blacklist member exists in the form of a token, that is, a verification string generated by s15.
步驟S23產生token’,驗證與播放器的token是否相同,如果相同,則遞送影音片段:快取伺服器會依據參數UID、ts-url、Time精準到十秒,如s15的公式,產生出token’,並驗證播放器提供之token是否相同;並考慮網路遞送所需要的基本時間,再驗證以前十秒產生Token。如果相同,則遞送影音片段。 Step S23 generates token', and verifies whether the token of the player is the same. If the token is the same, the video clip is delivered: the cache server will accurately generate the token according to the parameters UID, ts-url, and time to ten seconds, such as the formula of s15. ', and verify that the token provided by the player is the same; and consider the basic time required for network delivery, and then verify that the token is generated in the previous ten seconds. If they are the same, the video clip is delivered.
本實施例中如表四所示,驗證兩組Token: In this embodiment, as shown in Table 4, two sets of Tokens are verified:
第一組:Hash(UID+tsurl+Time) The first group: Hash (UID + tsurl + Time)
第二組:Hash(UID+tsurl+(Time-10see)) The second group: Hash (UID + tsurl + (Time-10see))
具體的Token如下: The specific Token is as follows:
第一組:Hash(ABCDEFGHIJKLMNOPQRSTUV0123456789 http://www.cht.com.tw/vidco/1.ts 2016/10/19_08:10:2) The first group: Hash (ABCDEFGHIJKLMNOPQRSTUV0123456789 http://www.cht.com.tw/vidco/1.ts 2016/10/19_08:10:2)
第二組:Hash(ABCDEFGHIJKLMNOPQRSTUV0123456789 http://www.cht.com.tw/video/1.ts 2016/10/19_08:10:1) The second group: Hash (ABCDEFGHIJKLMNOPQRSTUV0123456789 http://www.cht.com.tw/video/1.ts 2016/10/19_08:10:1)
若是播放器提供的Token與快取伺服器產生的第一組或第二組Token,其中任何一組相同,則可遞送該影音片段。 If the Token provided by the player is the same as the first or second set of tokens generated by the cache server, any of which is the same, the video clip can be delivered.
步驟S24回傳404,禁止播放器存取該姿影音片段:因驗證不通過,回傳播放器404,並禁止存取該影音片段。 Step S24 returns 404, prohibiting the player from accessing the pose video clip: because the verification fails, the player 404 is returned, and access to the video clip is prohibited.
步驟S25遞送子需求(sub-request)至資源納管伺服器,詢問是否放行:快取伺服器發送子需求至資源納管伺服器,由資源納管伺服器統計token-ip的對應數量,是否超過C的IP。 Step S25 delivers a sub-request to the resource management server, asking whether to release: the cache server sends the sub-requirement to the resource management server, and the resource management server counts the corresponding number of token-ip, whether More than C's IP.
步驟S26回傳404,禁止播放器存取該影音片段:資源納管伺服器回傳禁止存取,故,快取伺服器回傳播放器404,並禁止存取該影音片段。 Step S26 returns 404, prohibiting the player from accessing the video clip: the resource management server returns the access prohibition, so the cache server returns the player 404 and prohibits accessing the video clip.
步驟S27更新黑名單成員至快取伺服器:更新黑名單成員至快取伺服器,作為非查驗時段時,快速阻擋非法使用者的依據。 In step S27, the blacklist member is updated to the cache server: the blacklist member is updated to the cache server, and the basis for quickly blocking the illegal user is used as the non-checking period.
步驟S28資源納管伺服器允許放行;快取伺服器遞送該影音片段:資源納管伺服器回傳允許存取,故,快取伺服器遞送播放器需求之影音片段。 Step S28: the resource management server allows the release; the cache server delivers the video clip: the resource management server returns the access, so the cache server delivers the video clip required by the player.
由上所述,本發明內容傳遞網路之影音服務防盜連方法,係依據網路請求(Request)所帶入的驗證字串,判別是否透過正確之演算法產生,來決定該次資源請求是否可以正常存取CDN網路影音資源。透過查驗時段,服務節點會依據每個Request遞送一個Sub-Request至資源納管伺服器,由該伺服器統計分析,回應該Request是否為非法盜連,並將黑名單資訊同步至服務節點;於非查驗時段,服務節點則可依據黑名單,直接阻擋非法盜連者,因此相較習知技術,本發明更可迅速的辨別出非法盜連者及分享URL的盜連行為。 As described above, the video service anti-theft connection method of the content delivery network of the present invention determines whether the resource request is determined by the correct algorithm according to the verification string carried in the network request (Request). CDN network audio and video resources can be accessed normally. Through the verification period, the service node will deliver a Sub-Request to the resource management server according to each Request, and the server statistically analyzes whether the Request is illegally stolen and synchronizes the blacklist information to the service node; During the non-examination period, the service node can directly block the illegal pirate according to the blacklist. Therefore, compared with the prior art, the present invention can more quickly identify the piracy of the illegal pirate and the shared URL.
上列詳細說明係針對本發明之一可行實施例之具體說明,惟該實施例並非用以限制本發明之專利範圍,凡未脫離本發明技藝精神所為之等效實施或變更,均應包含於本案之專利範圍中。 The detailed description of the preferred embodiments of the present invention is intended to be limited to the scope of the invention, and is not intended to limit the scope of the invention. The patent scope of this case.
Claims (6)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW106112717A TWI640194B (en) | 2017-04-17 | 2017-04-17 | Content delivery network audio and video service anti-theft connection method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
TW106112717A TWI640194B (en) | 2017-04-17 | 2017-04-17 | Content delivery network audio and video service anti-theft connection method |
Publications (2)
Publication Number | Publication Date |
---|---|
TWI640194B true TWI640194B (en) | 2018-11-01 |
TW201840204A TW201840204A (en) | 2018-11-01 |
Family
ID=65033757
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW106112717A TWI640194B (en) | 2017-04-17 | 2017-04-17 | Content delivery network audio and video service anti-theft connection method |
Country Status (1)
Country | Link |
---|---|
TW (1) | TWI640194B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112995686A (en) * | 2021-02-03 | 2021-06-18 | 上海哔哩哔哩科技有限公司 | Data processing method, live broadcast method, authentication server and live broadcast data server |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112533034B (en) * | 2019-09-17 | 2023-08-25 | 青岛海信宽带多媒体技术有限公司 | HLS-based video providing method, device, equipment, medium and system |
CN115378878B (en) * | 2021-05-21 | 2023-11-14 | 北京字跳网络技术有限公司 | CDN scheduling method, device, equipment and storage medium |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW524015B (en) * | 2000-08-31 | 2003-03-11 | Sony Corp | Contents signal distribution method, reservation management device, and program acceptance medium |
US20090217354A1 (en) * | 2008-02-27 | 2009-08-27 | International Business Machines Corporation | Controlling access of a client system to access protected remote resources supporting relative urls |
US20140195651A1 (en) * | 2013-01-04 | 2014-07-10 | Qualcomm Incorporated | Live timing for dynamic adaptive streaming over http (dash) |
CN106331770A (en) * | 2016-09-06 | 2017-01-11 | 青岛海信电器股份有限公司 | Time synchronization method and client |
-
2017
- 2017-04-17 TW TW106112717A patent/TWI640194B/en active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
TW524015B (en) * | 2000-08-31 | 2003-03-11 | Sony Corp | Contents signal distribution method, reservation management device, and program acceptance medium |
US20090217354A1 (en) * | 2008-02-27 | 2009-08-27 | International Business Machines Corporation | Controlling access of a client system to access protected remote resources supporting relative urls |
US20140195651A1 (en) * | 2013-01-04 | 2014-07-10 | Qualcomm Incorporated | Live timing for dynamic adaptive streaming over http (dash) |
CN106331770A (en) * | 2016-09-06 | 2017-01-11 | 青岛海信电器股份有限公司 | Time synchronization method and client |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112995686A (en) * | 2021-02-03 | 2021-06-18 | 上海哔哩哔哩科技有限公司 | Data processing method, live broadcast method, authentication server and live broadcast data server |
CN112995686B (en) * | 2021-02-03 | 2022-04-19 | 上海哔哩哔哩科技有限公司 | Data processing method, live broadcast method, authentication server and live broadcast data server |
Also Published As
Publication number | Publication date |
---|---|
TW201840204A (en) | 2018-11-01 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107517179B (en) | Authentication method, device and system | |
RU2633111C1 (en) | One-range content delivery network, method and control device | |
US9607132B2 (en) | Token-based validation method for segmented content delivery | |
US8555367B2 (en) | Method and system for securely streaming content | |
US9774595B2 (en) | Method of authentication by token | |
WO2016184216A1 (en) | Link-stealing prevention method, link-stealing prevention server, and client side | |
US8910295B2 (en) | Secure content access authorization | |
US20140325553A1 (en) | Authentication and authorization for internet video client | |
US20050204038A1 (en) | Method and system for distributing data within a network | |
US20070168293A1 (en) | Method and apparatus for authorizing rights issuers in a content distribution system | |
CN107786526A (en) | Anti-stealing link method, client and server system | |
US20090138486A1 (en) | Secure Content Descriptions | |
US20220417241A1 (en) | Methods, Systems, and Devices for Server Control of Client Authorization Proof of Possession | |
KR20130056343A (en) | Improvements in watermark extraction efficiency | |
WO2011063731A1 (en) | Method for accessing video service and video playing system | |
CN110662091B (en) | Third-party live video access method, storage medium, electronic device and system | |
TWI640194B (en) | Content delivery network audio and video service anti-theft connection method | |
US20030217163A1 (en) | Method and system for assessing a right of access to content for a user device | |
CN105915494A (en) | Anti-stealing-link method and system | |
CN109996095A (en) | Method, system and medium for preventing stealing link playing in network video on demand | |
JP2023542578A (en) | Anonymous authentication with token redemption | |
WO2018176816A1 (en) | Video requesting and playing method and device | |
US20200364317A1 (en) | Method and system for identifying a user terminal in order to receive streaming protected multimedia content | |
CN111163069A (en) | Block chain-based Internet of things user privacy protection method | |
KR100906645B1 (en) | System for authenticating access right for media contents |