WO2019061598A1 - Procédé de vérification de données et client - Google Patents
Procédé de vérification de données et client Download PDFInfo
- Publication number
- WO2019061598A1 WO2019061598A1 PCT/CN2017/107082 CN2017107082W WO2019061598A1 WO 2019061598 A1 WO2019061598 A1 WO 2019061598A1 CN 2017107082 W CN2017107082 W CN 2017107082W WO 2019061598 A1 WO2019061598 A1 WO 2019061598A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- blockchain
- client
- hash value
- server
- data
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/121—Timestamp
Definitions
- the present invention relates to the field of video live broadcast technology, and in particular, to a data verification method and a client.
- some anchors will increase the number of viewers watching the room at the same time by brushing the popularity, so as to gain revenue.
- the specific implementation method of popular popularity is on a server with very good performance, through cracking the live broadcast platform.
- the network protocol while forging a large number of fake client users simultaneously logged into the live broadcast room, thereby forging a large number of viewers, to brush the popularity data between the live broadcasts is relatively high.
- the embodiment of the invention provides a data verification method and a client to detect a situation in which a live room forges a fake client to brush popularity.
- the present application provides a data verification method, the method comprising:
- the client of the target room of the live broadcast platform receives the first blockchain delivered by the server;
- the client generates a second blockchain according to the first blockchain
- the client sends the second blockchain to the server, so that the server checks the received second blockchain to determine the legitimacy of the client.
- first blockchain and the second blockchain are the same data structure
- the data structure includes a block number of the blockchain, a hash value of the previous blockchain, a timestamp of the current time, a hash value of the current blockchain, and blockchain function data, and the blockchain function data A room number of the target room, a user identification of the client, and a logo of the client.
- step of the client generating a second blockchain according to the first blockchain includes:
- the block number of the second blockchain the current time, the hash value of the first blockchain, the hash value of the second blockchain, and the second blockchain function data, according to The data structure generates the second blockchain.
- the method further includes:
- the client verifies whether the first blockchain is legal. When the first block is legal, the client performs a step of generating a second blockchain according to the first blockchain.
- step of the first blockchain is an initial blockchain
- step of the client verifying whether the first blockchain is legal includes:
- the application provides a client, where the client enters a target room of a live broadcast platform, and the client includes:
- a receiving module configured to receive a first blockchain delivered by the server
- Generating a module configured to generate a second blockchain according to the first blockchain
- a sending module configured to send the second blockchain to the server, so that the server checks the received second blockchain to determine the legitimacy of the client.
- first blockchain and the second blockchain are the same data structure
- the data structure includes a block number of the blockchain, a hash value of the previous blockchain, a timestamp of the current time, a hash value of the current blockchain, and blockchain function data, and the blockchain function data A room number of the target room, a user identification of the client, and a logo of the client.
- the generating module is specifically configured to:
- the block number of the second blockchain the current time, the hash value of the first blockchain, the hash value of the second blockchain, and the second blockchain function data, according to The data structure generates the second blockchain.
- the client further includes:
- a verification module configured to verify whether the first blockchain is legal, and when the first block is chained, the generating module performs to generate a second blockchain according to the first blockchain step.
- the first blockchain is an initial blockchain
- the verification module is specifically configured to:
- the present invention also provides a server, comprising: a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein when the processor executes the computer program
- a server comprising: a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein when the processor executes the computer program
- the present invention further provides a computer readable storage medium having stored thereon a computer program, the program being implemented by the processor to implement the method of any of the first aspects.
- the client of the target room of the live broadcast platform receives the first blockchain delivered by the server; the client generates a second blockchain according to the first blockchain; the client sends the second blockchain to the client The server, so that the server checks the received second blockchain to determine the legitimacy of the client.
- the blockchain technology is used to verify the validity of the server to the client, and the behavior of using the virtual client to scan popularity in the live broadcast room of the live broadcast platform can be detected, thereby avoiding the abnormality of the anchor to obtain benefits.
- FIG. 1 is a schematic diagram of an embodiment of a server side data verification method according to an embodiment of the present invention
- FIG. 2 is a schematic diagram of another embodiment of a server side data verification method according to an embodiment of the present invention.
- FIG. 3 is a schematic diagram of an embodiment of step S103 according to an embodiment of the present invention.
- step S103 is a schematic diagram of another embodiment of step S103 according to an embodiment of the present invention.
- FIG. 5 is a schematic diagram of an embodiment of a server in an embodiment of the present invention.
- FIG. 6 is a schematic diagram of another embodiment of a server in an embodiment of the present invention.
- FIG. 7 is a schematic diagram of another embodiment of a server in an embodiment of the present invention.
- FIG. 8 is a schematic diagram of an embodiment of a client side data verification method according to an embodiment of the present invention.
- FIG. 9 is a schematic diagram of an embodiment of step S802 in the embodiment of the present invention.
- FIG. 10 is a schematic diagram of an embodiment of a client in an embodiment of the present invention.
- FIG. 11 is a schematic diagram of another embodiment of a client in an embodiment of the present invention.
- FIG. 12 is a schematic diagram of another embodiment of a client in an embodiment of the present invention.
- a data verification method is applied to a server, where the method includes:
- the server sends the first blockchain to the target client of the target room of the live platform, so that the target client receives the first blockchain, generates a second blockchain, and sends the second blockchain to the server. ;
- the server is the server corresponding to the live broadcast platform
- the client may be a user terminal, such as a smart terminal such as a mobile phone or a tablet computer.
- the target room is a live broadcast room established by the anchor on the live broadcast platform, and the target client is to enter the target live broadcast. Between the clients.
- a blockchain is a kind of chronologically combining data blocks in a sequential manner. Chained data structures and cryptographically guaranteed non-tamperable and unforgeable distributed ledgers.
- the server receives a second blockchain sent by the target client.
- the second blockchain is generated in step S101, after the target client receives the first blockchain, and the first blockchain and the second blockchain are the same data structure, and the data structure is The block number including the blockchain, the hash value of the previous blockchain, the timestamp of the current time, the hash value of the current blockchain, and the blockchain function data, the blockchain function data including the target room The room number, the target user's user ID, and the target client's flag.
- the previous blockchain hash value is a preset hash value, for example, 0.
- the hash (HASH) algorithm corresponding to the hash value is unified, and the HASH algorithm may be the SHA-256 algorithm, and may be other HASH algorithms, such as SHA-1, etc., which is not limited herein.
- step S103 the server checks the received second blockchain to determine whether it is correct; if yes, step S104 is performed, and if not, step S105 is performed;
- the first blockchain is delivered by the server to the target client of the target room of the live broadcast platform, so that the target client receives the first blockchain and generates a second blockchain, and the second blockchain is generated.
- the blockchain technology is used to verify the validity of the server to the client, and the behavior of using the virtual client to scan popularity in the live broadcast room of the live broadcast platform can be detected, thereby avoiding the abnormality of the anchor to obtain benefits.
- the server may determine the legality of all the clients in the target room according to the steps in S101 to S105, and detect whether there is a large amount of popularity in the target room. If the server detects an illegal client in the target room. If the preset number or preset ratio (proportion of all clients in the target room) is reached, it is determined that there is a large amount of popular popularity in the target room, and the maintenance personnel can punish the target room anchor accordingly, and can remove the calculation when the popularity is calculated. The popularity data of these illegal clients is made, so that the popularity data of the target room is attributed to reality.
- the target client is not received by the server.
- the second blockchain it can also be determined that the target client is an illegal client.
- the method in the embodiment of the present invention may further include:
- the first blockchain includes a block number of the first blockchain, a hash value of the previous blockchain, and a A timestamp of the first blockchain and function data of the blockchain, the blockchain function data includes a room number of the target room, a user identifier of the target client, and a flag of the target client.
- the first blockchain may be an initial blockchain generated by the server.
- the first blockchain is the first generated blockchain.
- the hash value of the previous blockchain in a blockchain is a preset hash value, for example, 0.
- the blockchain data structure is defined in advance, and when the first blockchain is generated, the first block is generated according to the predefined blockchain data structure.
- Chain in the same way, after the first blockchain is received by the client, when the second blockchain is generated according to the first blockchain, the generated second blockchain is also generated according to the predefined blockchain data structure.
- a typical blockchain must contain some necessary data so that one can verify the legitimacy of the blockchain itself, and the other makes it less prone to forgery.
- the blockchain data structure in the embodiment of the present invention relies on verifying the popularity of the room, so the room information and the like are included in the data structure of the blockchain.
- the blockchain data structure in the embodiment of the present invention may specifically be as follows:
- index is used to indicate the block number of the blockchain, usually starting from 0; previousHash is the HASH value of the previous blockchain; timestamp is the timestamp; where the data field is the splicing of some data, the content of this data field It is the data involved in the function required by the blockchain, that is, the above blockchain function data, including the room number, the user uid (user ID) of the client, and the client's token (the client's logo); the hash value is Indicates the current hash value of this blockchain.
- the server receives the newly generated second blockchain from the client, it can verify the legitimacy by verifying the data inside.
- the second blockchain includes a block number of the second blockchain, a previous blockchain hash value, a timestamp of generating the second blockchain, and blockchain function data, the target client
- the user identifier of the terminal and the identifier of the target client, as shown in FIG. 3, the foregoing step S103 may specifically include:
- step S103 may further include:
- S1035 Determine whether the hash value of the second blockchain and the overall hash value of the second blockchain match, and if not, determine that the second blockchain is incorrect.
- HASH Newblock.index+Newblock.previousHash+Newblock.timestamp+Newblock.data
- HASH is the hash value of the second blockchain, if the hash value of the second blockchain and the overall hash value of the second blockchain If there is no match, it is determined that the second blockchain is incorrect, and an error message can be returned to the target client.
- Embodiments of the server in the embodiment of the present invention are described below.
- an embodiment of a server in an embodiment of the present invention includes:
- the sending module 501 is configured to send the first blockchain to the target client of the live platform target room, so that the target client generates the second blockchain after receiving the first blockchain, and Transmitting the second blockchain to the server;
- the receiving module 502 is configured to receive a second blockchain sent by the target client.
- the verification module 503 is configured to check the received second blockchain to determine whether it is correct; if yes, determine that the target client is a legitimate client, and if not, determine the target client. Is an illegal client.
- verification module 503 is further configured to:
- the server further includes:
- a generating module 504 configured to generate the first blockchain, where the first blockchain includes a block number of the first blockchain, a hash value of the previous blockchain, and a time for generating the first blockchain And a blockchain function data, the blockchain function data including a room number of the target room, a user identifier of the target client, and a flag of the target client.
- the second blockchain includes a block number of the second blockchain, a previous blockchain hash value, a timestamp of generating the second blockchain, and blockchain function data, where the target client a user identifier and a logo of the target client;
- the verification module 503 is specifically configured to:
- verification module 503 is further specifically configured to:
- a server is also provided in the embodiment of the present invention. Referring to FIG. 7, the server includes:
- processor 702 can implement the data verification performed by the server when the computer program 703 is executed method.
- the memory 701 can be used to store a computer program 703 including software programs, modules, and data, and the processor 702 executes various computer applications 703 stored in the memory 701 to execute various functional applications and data processing of the server.
- the memory 701 can be used to store software programs and modules, and the processor 702 executes various functional applications and data processing of the server by running software programs and modules stored in the memory 701.
- the memory 701 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (for example, a game application, a chat application), and the like; and the storage data area may be stored. Data created based on the use of the server (game configuration data, audio data), and the like.
- the memory 701 may include a high speed random access memory, and may also include a nonvolatile memory such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
- the processor 702 is a control center of the server, and connects various parts of the entire server using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 701, and calling data stored in the memory 701, executing The server's various functions and processing data to monitor the server as a whole.
- the processor 702 can include one or more processing units; preferably, the processor 702 can integrate an application processor, wherein the application processor mainly processes an operating system, a user interface, an application, and the like.
- an embodiment of a data verification method in an embodiment of the present invention includes:
- the client of the target room of the live broadcast platform receives the first blockchain delivered by the server;
- the server is the server corresponding to the live broadcast platform
- the target room is the live broadcast room established by the anchor on the live broadcast platform
- the target client is the client that enters the target live broadcast room.
- a blockchain is a chained data structure that combines data blocks in a chronological order in a sequential manner, and cryptographically guaranteed non-tamperable and unforgeable distributed ledgers.
- the server When the server needs to detect whether the client is a virtual client for popular use in the target room, the server sends the first blockchain to the target client of the live platform target room, and the first blockchain is pre-acquired by the server. Or generated blockchain.
- the client generates a second blockchain according to the first blockchain.
- the first blockchain and the second blockchain may be the same data structure, and the data structure includes a block number of the blockchain, a hash value of the previous blockchain, and a timestamp of the current time.
- blockchain function data the blockchain function data including a room number of the target room, a user identifier of the client, and a logo of the client.
- the client sends the second blockchain to the server, so that the server checks the received second blockchain to determine the legitimacy of the client.
- the server checks the received second blockchain, and can directly determine whether it is correct; if yes, the target client is a legitimate client; if not, the target client is determined to be an illegal client.
- the client of the target room of the live broadcast platform receives the first blockchain delivered by the server; the client generates a second blockchain according to the first blockchain; the client sends the second blockchain to the client The server, so that the server checks the received second blockchain to determine the legitimacy of the client.
- the blockchain technology is used to verify the validity of the server to the client, and the behavior of using the virtual client to scan popularity in the live broadcast room of the live broadcast platform can be detected, thereby avoiding the abnormality of the anchor to obtain benefits.
- a typical blockchain must contain some necessary data so that one can verify the legitimacy of the blockchain itself, and the other makes it less prone to forgery.
- the blockchain data structure in the embodiment of the present invention relies on verifying the popularity of the room, so the room information and the like are included in the data structure of the blockchain.
- the blockchain data structure in the embodiment of the present invention may specifically be as follows:
- Lnt64 index used to indicate the block number of the blockchain, usually starting from 0.
- the hash value can be a preset hash value, such as 0.
- the server when the server receives the newly generated second blockchain from the client, it can verify the legitimacy by verifying the data inside.
- step S802 may further include:
- Number here is the block number of the first blockchain, that is, the block number of the second blockchain is the block number of the first blockchain plus one.
- Newblock.previousHash prevblock.hash
- calculating the hash value of the previous block of the new block is the hash value of the obtained previous block, where the hash value of the first block chain is calculated.
- S8024 Obtain a room number of the target room, a user identifier of the client, and a logo of the client, to obtain function data of the second blockchain;
- the roomid is the room number of the target room that the current user is viewing on the client.
- the data verification method may further include: the client verifies whether the first blockchain is legal, and when the first block chain is legal, the client is executed according to the client.
- the first blockchain generates a second blockchain.
- the first blockchain may be an initial blockchain
- the step of the client verifying whether the first blockchain is legal includes:
- the step of verifying, by the client, whether the first blockchain is legal or not further includes: calculating an overall hash value of the first blockchain; and performing a blockchain in the first blockchain The block number, the hash value of the previous blockchain, the timestamp of the first blockchain, and the blockchain function data are hashed to obtain a hash value of the first blockchain; Whether the hash value of the blockchain matches the overall hash value of the first blockchain, and if not, it is determined that the first blockchain is incorrect.
- FIG. 10 it is an embodiment of a client in an embodiment of the present invention, where the client includes:
- the receiving module 1001 is configured to receive a first blockchain delivered by the server;
- a generating module 1002 configured to generate a second blockchain according to the first blockchain
- the sending module 1003 is configured to send the second blockchain to the server, so that the server checks the received second blockchain to determine the legitimacy of the client.
- first blockchain and the second blockchain are the same data structure
- the data structure includes a block number of a blockchain, a hash value of a previous blockchain, a timestamp of a current time, and blockchain function data, the blockchain function data including a room number of the target room, The user identifier of the client and the logo of the client.
- the generating module 1002 is specifically configured to:
- the block number of the second blockchain the current time, the hash value of the first blockchain, the hash value of the second blockchain, and the second blockchain function data, according to The data structure generates the second blockchain.
- the client further includes:
- the verification module 1004 is configured to check whether the first blockchain is legal. When the first block is legal, the generating module performs to generate a second blockchain according to the first blockchain. A step of.
- the first blockchain is an initial blockchain
- the verification module 1004 is specifically configured to:
- a client is also provided in the embodiment of the present invention. Referring to FIG. 12, the client includes:
- the memory 1201 is a processor 1202 and a computer program 1203 stored on the memory and executable on the processor, wherein the data verification method can be implemented when the processor 1202 executes the computer program 1203.
- clients involved in the present application include, but are not limited to, mobile terminals (mobile phones, smart phones, PADs, notebook computers, etc.), fixed terminals (computers).
- the memory 1201 can be used to store a computer program 1203 including software programs, modules, and data, and the processor 1202 executes the computer program 1203 stored in the memory 1201 to execute various functional applications and data processing of the client.
- the memory 1201 can be used to store software programs and modules, and the processor 1202 executes various functional applications and data processing of the client by running software programs and modules stored in the memory 1201.
- the memory 1201 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (for example, a game application, a chat application), and the like; and the storage data area may be stored. Data created based on the use of the client (game configuration data, audio data), and the like.
- the memory 1201 may include a high speed random access memory, and may also include a nonvolatile memory such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
- the processor 1202 is a control center of the client that connects various parts of the entire client using various interfaces and lines, executes or executes software programs and/or modules stored in the memory 1201, and calls data stored in the memory 1201 to execute The client's various functions and processing data to monitor the client as a whole.
- the processor 1202 may include one or more processing units; preferably, the processor 1202 may integrate an application processor, where The application processor primarily handles operating systems, user interfaces, applications, and the like.
- the embodiment of the present invention further provides a computer readable storage medium, wherein the computer readable storage medium can store a program, and the program includes some or all of the steps of the data verification method described in the foregoing method embodiments.
- the disclosed system, apparatus, and method may be implemented in other manners.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
- each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
- the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
- the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
- the technical solution of the present invention which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium.
- a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
- the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
La présente invention concerne un procédé de vérification de données et un client. Le procédé, dans les modes de réalisation de la présente invention, comprend les étapes suivantes : un client dans une salle cible sur une plateforme de diffusion en direct reçoit une première chaîne de blocs émise par un serveur ; le client génère une seconde chaîne de blocs selon la première chaîne de blocs ; et le client envoie la seconde chaîne de blocs au serveur, de telle sorte que le serveur vérifie la seconde chaîne de blocs reçue et détermine la légitimité du client. Selon les modes de réalisation de la présente invention, une technologie de chaîne de blocs est utilisée pour réaliser la vérification de la légitimité d'un client par un serveur, de telle sorte qu'un comportement au moyen duquel un client virtuel est utilisé pour augmenter la popularité dans une salle de diffusion en direct sur une plateforme de diffusion en direct peut être détecté, permettant ainsi d'empêcher un ancrage de diffusion en direct d'utiliser des moyens anormaux pour acquérir un bénéfice.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710883393.9 | 2017-09-26 | ||
CN201710883393.9A CN107682328A (zh) | 2017-09-26 | 2017-09-26 | 一种数据校验方法及客户端 |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2019061598A1 true WO2019061598A1 (fr) | 2019-04-04 |
Family
ID=61138168
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/107082 WO2019061598A1 (fr) | 2017-09-26 | 2017-10-20 | Procédé de vérification de données et client |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN107682328A (fr) |
WO (1) | WO2019061598A1 (fr) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107465698A (zh) * | 2017-09-26 | 2017-12-12 | 武汉斗鱼网络科技有限公司 | 一种数据校验方法及服务器 |
CN110213597B (zh) * | 2018-03-30 | 2021-09-07 | 腾讯科技(深圳)有限公司 | 一种通过浏览器进入直播房间的方法和装置 |
CN108847926A (zh) * | 2018-06-22 | 2018-11-20 | 武汉斗鱼网络科技有限公司 | 一种客户端安全检测方法、装置及客户端设备 |
CN109033406B (zh) * | 2018-08-03 | 2020-06-05 | 上海点融信息科技有限责任公司 | 用于搜索区块链数据的方法、装置及存储介质 |
CN110263579B (zh) * | 2018-11-16 | 2021-05-11 | 腾讯科技(深圳)有限公司 | 一种数据处理方法、系统及相关设备 |
CN112995706B (zh) * | 2019-12-19 | 2022-04-19 | 腾讯科技(深圳)有限公司 | 基于人工智能的直播方法、装置、设备及存储介质 |
CN113521751B (zh) * | 2021-07-27 | 2023-11-14 | 腾讯科技(深圳)有限公司 | 操作测试方法和装置、存储介质及电子设备 |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106385601A (zh) * | 2016-09-14 | 2017-02-08 | 武汉斗鱼网络科技有限公司 | 基于多协议验证的同时观看直播人数的统计方法及系统 |
CN106385593A (zh) * | 2016-09-14 | 2017-02-08 | 武汉斗鱼网络科技有限公司 | 基于椭圆曲线算法的同时观看直播人数的统计方法及系统 |
CN106453271A (zh) * | 2016-09-21 | 2017-02-22 | 江苏通付盾科技有限公司 | 身份注册方法及系统、身份认证方法及系统 |
US20170149560A1 (en) * | 2012-02-02 | 2017-05-25 | Netspective Communications Llc | Digital blockchain authentication |
CN107454110A (zh) * | 2017-09-26 | 2017-12-08 | 武汉斗鱼网络科技有限公司 | 一种数据校验方法及服务器 |
CN107465698A (zh) * | 2017-09-26 | 2017-12-12 | 武汉斗鱼网络科技有限公司 | 一种数据校验方法及服务器 |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105743854A (zh) * | 2014-12-11 | 2016-07-06 | 深圳富泰宏精密工业有限公司 | 安全认证系统及方法 |
CN105516143B (zh) * | 2015-12-10 | 2018-09-11 | 浙江省公众信息产业有限公司 | 流媒体的防盗链方法、设备以及系统 |
KR101637868B1 (ko) * | 2016-02-22 | 2016-07-08 | 주식회사 코인플러그 | 블록체인을 기반으로 하는 금융기관 제증명서류 위변조 검증시스템 및 방법 |
CN106534160B (zh) * | 2016-12-02 | 2020-02-21 | 江苏通付盾科技有限公司 | 基于区块链的身份认证方法及系统 |
-
2017
- 2017-09-26 CN CN201710883393.9A patent/CN107682328A/zh active Pending
- 2017-10-20 WO PCT/CN2017/107082 patent/WO2019061598A1/fr active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170149560A1 (en) * | 2012-02-02 | 2017-05-25 | Netspective Communications Llc | Digital blockchain authentication |
CN106385601A (zh) * | 2016-09-14 | 2017-02-08 | 武汉斗鱼网络科技有限公司 | 基于多协议验证的同时观看直播人数的统计方法及系统 |
CN106385593A (zh) * | 2016-09-14 | 2017-02-08 | 武汉斗鱼网络科技有限公司 | 基于椭圆曲线算法的同时观看直播人数的统计方法及系统 |
CN106453271A (zh) * | 2016-09-21 | 2017-02-22 | 江苏通付盾科技有限公司 | 身份注册方法及系统、身份认证方法及系统 |
CN107454110A (zh) * | 2017-09-26 | 2017-12-08 | 武汉斗鱼网络科技有限公司 | 一种数据校验方法及服务器 |
CN107465698A (zh) * | 2017-09-26 | 2017-12-12 | 武汉斗鱼网络科技有限公司 | 一种数据校验方法及服务器 |
Also Published As
Publication number | Publication date |
---|---|
CN107682328A (zh) | 2018-02-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2019061626A1 (fr) | Procédé de verification de données, et serveur | |
WO2019061598A1 (fr) | Procédé de vérification de données et client | |
CN110830735B (zh) | 一种视频生成方法、装置、计算机设备和存储介质 | |
WO2019061628A1 (fr) | Procédé de vérification de données, et serveur | |
WO2019061630A1 (fr) | Procédé de gestion comptable de transaction, et client | |
CN107426253B (zh) | 一种数据校验方法及客户端 | |
WO2019061629A1 (fr) | Procédé de vérification de données et serveur | |
WO2019061627A1 (fr) | Procédé de vérification de données et serveur | |
WO2017036365A1 (fr) | Procédé de traitement de communication vocale, dispositif électronique, système et support de stockage | |
WO2019061597A1 (fr) | Procédé de traitement de données et serveur | |
CN108805571B (zh) | 数据保护方法、平台、区块链节点、系统和存储介质 | |
WO2019134303A1 (fr) | Appareil et procédé de traitement de popularité de salle de flux en direct, serveur et support d'informations | |
WO2019061599A1 (fr) | Procédé d'authentification et serveur | |
WO2019001083A1 (fr) | Procédé et dispositif d'authentification pour adresse de flux vidéo | |
CN108260015B (zh) | 一种投票数据处理方法、装置及电子设备 | |
CN110912689A (zh) | 一种唯一值的生成、验证方法及系统 | |
US20150244664A1 (en) | Enterprise messaging platform | |
CN113365097B (zh) | 直播信息流处理方法、装置、系统、电子设备及存储介质 | |
CN107888623B (zh) | 直播软件音视频数据流防劫持方法及装置 | |
CN111461720A (zh) | 基于区块链的身份验证方法、装置、存储介质及电子设备 | |
CN106230860B (zh) | 发送流媒体的方法和装置 | |
CN108924089B (zh) | 一种客户端设备识别方法、装置及客户端设备 | |
CN112753031A (zh) | 媒体内容控制 | |
CN108289096B (zh) | 一种直播间关注、验证直播间关注的方法及装置 | |
CN110072127B (zh) | 媒体流播放处理方法、装置、系统、存储介质和设备 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17927187 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 17927187 Country of ref document: EP Kind code of ref document: A1 |