WO2019136847A1 - Procédé, dispositif et système pour calculer la popularité d'une salle de retransmission en direct, et support de stockage - Google Patents

Procédé, dispositif et système pour calculer la popularité d'une salle de retransmission en direct, et support de stockage Download PDF

Info

Publication number
WO2019136847A1
WO2019136847A1 PCT/CN2018/081294 CN2018081294W WO2019136847A1 WO 2019136847 A1 WO2019136847 A1 WO 2019136847A1 CN 2018081294 W CN2018081294 W CN 2018081294W WO 2019136847 A1 WO2019136847 A1 WO 2019136847A1
Authority
WO
WIPO (PCT)
Prior art keywords
authentication value
popularity
client
authentication
calculation
Prior art date
Application number
PCT/CN2018/081294
Other languages
English (en)
Chinese (zh)
Inventor
周志刚
张文明
陈少杰
Original Assignee
武汉斗鱼网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 武汉斗鱼网络科技有限公司 filed Critical 武汉斗鱼网络科技有限公司
Publication of WO2019136847A1 publication Critical patent/WO2019136847A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0625Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation with splitting of the data block into left and right halves, e.g. Feistel based algorithms, DES, FEAL, IDEA or KASUMI
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0618Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
    • H04L9/0631Substitution permutation network [SPN], i.e. cipher composed of a number of stages or rounds each involving linear and nonlinear transformations, e.g. AES algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/24Monitoring of processes or resources, e.g. monitoring of server load, available bandwidth, upstream requests
    • H04N21/2407Monitoring of transmitted content, e.g. distribution time, number of downloads
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25891Management of end-user data being end-user preferences
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/60Network structure or processes for video distribution between server and client or between remote clients; Control signalling between clients, server and network components; Transmission of management data between server and client, e.g. sending from server to client commands for recording incoming content stream; Communication details between server and client 
    • H04N21/63Control signaling related to video distribution between client, server and network components; Network processes for video distribution between server and clients or between remote clients, e.g. transmitting basic layer and enhancement layers over different transmission paths, setting up a peer-to-peer communication via Internet between remote STB's; Communication protocols; Addressing
    • H04N21/633Control signals issued by server directed to the network components or client
    • H04N21/6332Control signals issued by server directed to the network components or client directed to client
    • H04N21/6334Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key
    • H04N21/63345Control signals issued by server directed to the network components or client directed to client for authorisation, e.g. by transmitting a key by transmitting keys

Definitions

  • the invention relates to the technical field of human-machine recognition, in particular to a method, a storage medium, a device and a system for calculating the popularity of a live broadcast.
  • This method of forging false popularity data by cracking the network protocol of the live broadcast platform not only has a certain impact on the live broadcast of other anchors, but also affects the user experience; it also affects the security of the live broadcast platform. Threat.
  • the object of the present invention is to overcome the deficiencies of the above background art, and to provide a method, a storage medium, a device and a system for calculating popularity among live broadcasts, and adopting a hardware breakpoint method to set a complex popularity authentication algorithm to improve client popularity.
  • the threshold of the weight algorithm is effectively cracked, effectively preventing hackers from maliciously brushing the popularity of the live broadcast by cracking the popularity authentication algorithm.
  • the technical solution adopted by the present invention is to provide a method for calculating popularity among live broadcasts, the method comprising the following steps:
  • the client uses the preset popularity authentication algorithm to calculate the authentication value.
  • the popularity authentication algorithm calls the ordinary authentication value calculation algorithm to calculate the first authentication value, and triggers the preset hardware after the calculation is completed.
  • the breakpoint function calculates a second authentication value by using a preset hardware breakpoint processing function, and the second authentication value is a final calculated authentication value;
  • the client encrypts the calculated authentication value and reports it to the live platform server;
  • the live platform server calculates the authentication value by using the same algorithm as the client, and compares the calculated authentication value with the authentication value reported by the client. Consistent, the popularity of the client is calculated into the popularity of the live broadcasts it watches.
  • the preset of the hardware breakpoint function includes the following operations: increasing the permission of the client process, so that the hardware breakpoint function can be set; registering the pre-written hardware breakpoint processing function, When the hardware breakpoint function is triggered, the system will call the registered hardware breakpoint processing function; set the trigger address of the hardware breakpoint, and set it to the end address of the normal authentication value calculation algorithm.
  • the specific process of calculating the first authentication value by the ordinary authentication value calculation algorithm is: splicing the user information of the client to form a calculation parameter; and calculating the MD5 value of the calculation parameter. , get the first authentication value.
  • the specific process of calculating the second authentication value by the preset hardware breakpoint processing function is: splicing the user information of the client with the first authentication value to form a calculation parameter; Calculate the parameters to calculate the MD5 value to obtain the second authentication value.
  • the present invention also provides a storage medium having stored thereon a computer program that, when executed by a processor, implements the steps of the method of calculating popularity among live broadcasts.
  • the present invention also provides an apparatus for calculating popularity among live broadcasts, comprising a memory, a processor, and a computer program stored on the memory and running on the processor, the processor implementing the computer program to prevent the popularity The steps of the method.
  • the present invention also provides a system for calculating the popularity of a live broadcast, the system comprising an authentication value calculation unit, an authentication value reporting unit, and an authentication value verification unit disposed on the live broadcast platform server;
  • the authentication value calculation unit is configured to: use a preset popularity authentication algorithm to calculate an authentication value; in the calculation process, the popularity authentication algorithm calls a normal authentication value calculation algorithm to calculate a first authentication value, After the calculation is completed, the preset hardware breakpoint function is triggered, and the second authentication value is calculated by using a preset hardware breakpoint processing function, and the second authentication value is the final calculated authentication value;
  • the authentication value reporting unit is configured to: after the encrypted authentication value calculated by the authentication value calculation unit is encrypted, reported to the live platform server;
  • the authentication value verification unit is configured to: decrypt the information reported by the client, obtain the authentication value reported by the client, calculate the authentication value by using the same algorithm as the client, and calculate the calculated authentication value. Compare with the authentication value reported by the client. If they match, the popularity of the client is calculated into the popularity of the live broadcast.
  • the system further includes a hardware breakpoint function preset unit disposed on the client, and the hardware breakpoint function preset unit is configured to: enhance the permission of the client process, so that the hardware breakpoint function can be set. Register the pre-written hardware breakpoint processing function so that when the hardware breakpoint function is triggered, the system will call the registered hardware breakpoint processing function; set the trigger address of the hardware breakpoint and set it to The end address of the normal authentication value calculation algorithm.
  • the authentication value calculation unit uses the popularity authentication algorithm to call the ordinary authentication value calculation algorithm to calculate the first authentication value: the user information of the client is spliced to form a calculation. Parameter; calculating the MD5 value of the calculated parameter to obtain a first authentication value.
  • the specific process of calculating the second authentication value by using the popularity authentication function by using the popularity authentication algorithm is: the user information of the client and the first The weights are spliced to form a calculation parameter; the calculation of the MD5 value is performed on the calculation parameter to obtain a second authentication value.
  • the invention splits the popularity authentication algorithm into two parts: one part is to execute a normal authentication value calculation algorithm normally, and after the execution is completed, a hardware breakpoint is generated, thereby starting to execute the second part of the hardware breakpoint processing function in the hardware The second part of the popularity authentication algorithm is executed in the breakpoint processing function, thereby finally obtaining the authentication value of the popularity authentication algorithm.
  • the method makes the popularity authentication algorithm more complicated and difficult to be cracked, even if the hacker can only crack the first part of the ordinary authentication value calculation algorithm, then the abnormal client or the popular server It is impossible to execute the hardware breakpoint processing function to the hardware breakpoint. Since it can only calculate the authentication value of some popular authentication algorithms, the calculation result must be wrong. The server can easily judge that it is a popular behavior. Therefore, it is not counted into the popularity of the live broadcast, thus achieving an accurate solution for calculating the popularity of the live broadcast.
  • FIG. 1 is a flowchart of a method for calculating popularity among live broadcasts according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a device for calculating popularity among live broadcasts according to an embodiment of the present invention
  • FIG. 3 is a structural block diagram of a system for calculating popularity among live broadcasts according to an embodiment of the present invention.
  • the scheme sets a hardware breakpoint to the popularity authentication algorithm in the process of running the preset popularity authentication algorithm, and then triggers the hardware breakpoint function after the popular authentication algorithm performs the normal authentication value calculation, thereby
  • the pre-written hardware breakpoint processing function can be captured, and the authentication value is further calculated in the hardware breakpoint processing function, so that the popularity authentication algorithm is more complicated and difficult to be cracked.
  • the traditional popularity authentication algorithm calculates an authentication value KEY through some parameters, and sends the KEY value to the server.
  • the server uses the same algorithm to calculate the KEY value of the server, and compares whether the value of the client is consistent. Consistent determines that the client is legitimate.
  • the hacker obtains the KEY value sent by a large number of clients by intercepting the network protocol, the traditional popularity authentication algorithm can be easily cracked, thereby achieving the purpose of forging popularity.
  • the design idea of the present invention is that in the process of running the popularity authentication algorithm, the algorithm first calculates an authentication value KEY1 through a common authentication value calculation algorithm, and after the KEY1 value is calculated, the preset is triggered.
  • the KEY1 value can be further encrypted in the hardware breakpoint processing function to obtain the authentication value KEY2, so that only the hardware breakpoint program can be processed to correctly calculate the authentication value KEY2, Otherwise, the authentication value KEY2 cannot be calculated correctly.
  • the core design idea of the present invention is to split the popularity authentication algorithm into two parts: one part is to execute a normal authentication value calculation algorithm normally, and a hardware breakpoint is generated after the execution is completed, thereby starting to execute the second part.
  • the hardware breakpoint processing function performs the calculation of the second part of the popularity authentication algorithm in the hardware breakpoint processing function, thereby finally obtaining the authentication value of the popularity authentication algorithm.
  • This method makes the popularity authentication algorithm more complicated and difficult to be cracked. Even if the hacker can only crack the first part of the ordinary authentication value calculation algorithm, the abnormal client or the popular server cannot execute to the hardware breakpoint.
  • the hardware breakpoint processing function because it can only calculate the authentication value of some popular authentication algorithms, so the calculation result must be wrong, the server can easily determine that it is a popular behavior, so it is not counted To the popularity of the live broadcast, so as to achieve an accurate calculation of the popularity of the live broadcast.
  • an embodiment of the present invention provides a method for calculating popularity among live broadcasts, where the method includes the following steps:
  • Step S1 The client calculates the authentication value: the client uses the preset popularity authentication algorithm to calculate the authentication value; in the calculation process, the popularity authentication algorithm first calls the ordinary authentication value calculation algorithm to calculate the first authentication.
  • the normal authentication value calculation algorithm when used to calculate the first authentication value KEY1, the existing various authentication value calculation algorithms or the authentication prepared according to the requirements of the live platform may be used.
  • the value calculation algorithm is used to calculate the KEY1 value, and there is no limitation here.
  • the specific process of calculating the first authentication value KEY1 by calling the normal authentication value calculation algorithm may be as follows: splicing the user information of the client to form a calculation parameter; The calculation parameter performs the calculation of the MD5 value to obtain the first authentication value KEY1.
  • the user information may include: a UID (User ID) of the user, a Token information sent by the live platform server when the user logs in, and a DID (Device ID, user) of the user. Device unique ID) information, timestamp information of the current system TimeStamp, room number information RoomId currently requested by the user, and the like.
  • the function code corresponding to the ordinary authentication value calculation algorithm can be as follows:
  • g_KEY1 MD5.Create(UID+Token+DID+TimeStamp+ RoomId);
  • the preset hardware breakpoint processing function can adopt various existing calculation algorithms or according to the live platform.
  • the calculation algorithm that needs to be written by itself is used to calculate the KEY2 value, and there is no limitation here.
  • the specific process of calculating the second authentication value KEY2 by the preset hardware breakpoint processing function may be as follows: performing user information of the client with the first authentication value KEY1. Splicing, forming a calculation parameter; performing calculation of the MD5 value on the calculation parameter to obtain a second authentication value KEY2.
  • the user information may further include: the UID information of the user, the Token information delivered by the live platform server when the user logs in, the DID information of the user, the timestamp TimeStamp of the current system, the room number information RoomId currently requested by the user, and the like.
  • the corresponding function code can be as follows:
  • g_KEY2 MD5.Create(UID+Token+DID+TimeStamp+RoomId+g_KEY1);
  • the user information (such as UID+Token+DID+TimeStamp+RoomId) is added to the first reference by using a preset hardware breakpoint processing function.
  • the parameter after the weight KEY1 is further calculated by the MD5 value, thereby obtaining the second authentication value KEY2 as the final authentication value.
  • the final falsified authentication value is the KEY1 value calculated only once.
  • the hardware breakpoint processing function is encapsulated in the processing logic of the hardware breakpoint function, and is separate from the code of the ordinary authentication value calculation algorithm, and there is no coupling in execution, so that the hacker is more difficult to find. .
  • the preset of the hardware breakpoint function includes the following operations:
  • the permissions of the process can be enhanced by calling a series of API (Application Programming Interface) functions. For example: first call the API function GetCurrentProcess to get the handle of the current program; then call the API function OpenProcessToken to open the access token associated with the process; then call the API function LookupPrivilegeValue to get the value of the DEBUG permission, and finally call the API function AdjustTokenPrivileges to adjust the process
  • the permissions are DEBUG permissions (ie debug permissions, which are higher).
  • the pre-written hardware breakpoint processing function (it can be understood that the function of the written hardware breakpoint processing function is to calculate the specific process of the second authentication value KEY2 according to the content described above) Registration is performed so that when the hardware breakpoint function is triggered, the system calls the registered hardware breakpoint handler.
  • the specific implementation principle is: By registering a vectorized exception handling function provided by Windows, the corresponding abnormal event can be captured. After setting the memory address for the debug register of the CPU, when the address is accessed, the CPU will throw a read-write exception. By registering this exception handler, the thrown exception can be caught and can be obtained in the exception handler.
  • the specific implementation process can be as follows: register an exception by calling the API function AddVectoredExceptionHandler, for example,
  • the FirstHandler is filled with 0, indicating that the registered exception handler is the last one to take over the exception. Then the key is to register the pre-written hardware breakpoint processing function VectoredHandler to the system's exception takeover.
  • the process is unable to execute code, only the thread can execute the code, and a process contains multiple threads, so you need to set hardware breakpoints in all threads of a process.
  • first take a snapshot of the thread by calling the API function CreateToolhelp32Snapshot, where the parameter is passed to TH32CS_SNAPTHREAD, indicating that all threads of the system are acquired.
  • the API function Thread32Next to get the handle of the next thread, and always call the Thread32Next function to traverse all the threads until the thread that is not obtained is empty.
  • the context information of the thread is first obtained by calling the API function GetThreadContext, wherein the call to the function GetThreadContext passes the parameter CONTEXT_DEBUG_REGISTERS to obtain the register information of the thread context.
  • the four debug registers of the CPU are Dr0, Dr1, Dr2, and Dr3, then:
  • the function code of the ordinary authentication value calculation algorithm is set as the monitored hardware breakpoint, and then the function address of the ordinary authentication value calculation algorithm can be set as a hardware break.
  • the trigger address of the point. That is, the address of the function CreateKey is set to the address of the hardware breakpoint, such as ctx.Dr0 CreateKey, where Address is the memory address of the common authentication value calculation algorithm CreateKey to be set; ctx.Dr7
  • 0xf0501.
  • Step S2 The client reports the authentication value: the client encrypts the calculated authentication value and reports it to the live platform server.
  • the encryption algorithm used in step S2 can be selected according to actual needs, such as a symmetric encryption algorithm AES or DES, which is not limited herein.
  • the symmetric encryption algorithm AES is used for encryption, and the encrypted authentication value is carried along with the timestamp TimeStamp of the client, which can further improve the reliability of the encryption.
  • the specific implementation code can be as follows:
  • Encryptdata AES.Encrypt(g_KEY2+timestamp,key);
  • the encryption algorithm AES.Encrypt is used to encrypt the data g_KEY2 together with the timestamp of the client.
  • the parameter key required for encryption may be a key value negotiated by the server or the client in advance or sent by the server in advance.
  • the final client reports the result Encryptdata to the live platform server.
  • Step S3 The server verifies the authentication value: after the broadcast platform server decrypts the authentication value reported by the client, the same algorithm as the client is used to calculate the authentication value, and the calculated authentication value and the client are calculated. The reported authentication value is compared and verified. If the comparison verification is passed (that is, the data of the two are consistent), indicating that the client is a legitimate client, the popularity of the client is calculated to be in the popularity of the live broadcast viewed. If the comparison fails (ie, the data of the two is inconsistent), indicating that the client is an illegal client, the popularity of the client is not counted to the popularity of the live broadcast.
  • the live platform server compares the calculated sKEY2 with the g_KEY2 reported by the client. If it is consistent, the client is a legitimate client.
  • the popularity of the client should be calculated to the popularity of the live broadcast, that is, the live broadcast.
  • the popularity value will be increased by one; otherwise, the popularity of the client will not be calculated, that is, the popularity value of the live broadcast room will remain unchanged.
  • the embodiment of the present invention further provides a storage medium, where the computer program is stored, and the computer program is executed by the processor to implement the method for calculating the popularity between the live broadcasts in the foregoing embodiments.
  • the storage medium includes a U disk, a mobile hard disk, a ROM (Read-Only Memory), a RAM (Random Access Memory), a disk or an optical disk, and the like. The medium of the code.
  • an embodiment of the present invention further provides a device for calculating popularity among live broadcasts, including a memory, a processor, and being stored in a memory and operable on the processor.
  • the computer program when the processor executes the computer program, implements the steps of the method for calculating popularity among the live broadcasts in the above embodiments.
  • an embodiment of the present invention further provides a system for calculating popularity among live broadcasts, where the system includes an authentication value calculation unit, an authentication value reporting unit, and an authentication value set on a live platform server. Calibration unit.
  • the authentication value calculation unit is configured to: use a preset popularity authentication algorithm to calculate an authentication value; in the calculation process, the popularity authentication algorithm calls a normal authentication value calculation algorithm to calculate the first authentication. After the calculation is completed, the preset hardware breakpoint function is triggered, and the second authentication value is calculated by using a preset hardware breakpoint processing function, and the second authentication value is the final calculated authentication value.
  • the authentication value reporting unit is configured to: after the encrypted authentication value calculated by the authentication value calculation unit is encrypted, reported to the live platform server.
  • the authentication value verification unit is configured to: decrypt the information reported by the client, obtain the authentication value reported by the client, calculate the authentication value by using the same algorithm as the client, and calculate the calculated authentication value. Compare with the authentication value reported by the client. If they match, the popularity of the client is calculated into the popularity of the live broadcast.
  • the system further includes a hardware breakpoint function preset unit disposed on the client.
  • the hardware breakpoint function preset unit is used to: enhance the permission of the client process, so that the hardware breakpoint function can be set; the pre-written hardware breakpoint processing function is registered, so that when the hardware breakpoint function is triggered, the system
  • the registered hardware breakpoint processing function is called; the trigger address of the hardware breakpoint is set, and it is set to the end address of the normal authentication value calculation algorithm.
  • the specific process of calculating the first authentication value by using the popularity authentication value calculation algorithm by using the popularity authentication algorithm is: splicing the user information of the client Forming a calculation parameter; performing calculation of the MD5 value on the calculation parameter to obtain a first authentication value.
  • the specific process of calculating the second authentication value by using the preset hardware breakpoint processing function by using the popularity authentication algorithm is: splicing the user information of the client with the first authentication value to form a calculation parameter. Calculating the MD5 value for the calculated parameter to obtain a second authentication value.

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Graphics (AREA)
  • Power Engineering (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

L'invention se rapporte au domaine technique de la reconnaissance homme-machine. Elle concerne un procédé, un dispositif et un système pour calculer la popularité d'une salle de retransmission en direct, et un support de stockage. Le procédé comprend les étapes suivantes : lorsqu'un client calcule une valeur d'authentification en utilisant un algorithme d'authentification de popularité prédéfini, ledit algorithme calcule d'abord une première valeur d'authentification en appelant un algorithme de calcul de valeur d'authentification ordinaire, une fonction prédéfinie de point d'arrêt matériel est déclenchée à la fin du calcul, et une seconde valeur d'authentification est calculée, en tant que valeur d'authentification finale, au moyen d'une fonction de traitement de point d'arrêt matériel; le client déclare la valeur d'authentification à un serveur de plate-forme de retransmission en direct après cryptage de la valeur d'authentification; et le serveur de plate-forme de retransmission en direct décrypte la valeur d'authentification cryptée pour obtenir la valeur d'authentification déclarée par le client, calcule la valeur d'authentification en utilisant un algorithme identique à celui utilisé par le client, et compare la valeur d'authentification calculée à la valeur d'authentification déclarée par le client; et si les valeurs d'authentification sont cohérentes, la popularité du client est ajoutée à la popularité de la salle de retransmission en direct observée. L'invention permet de relever efficacement le seuil à atteindre pour casser l'algorithme d'authentification de popularité du client, et met en oeuvre le mécanisme pouvant calculer avec précision la popularité de la salle de retransmission en direct.
PCT/CN2018/081294 2018-01-09 2018-03-30 Procédé, dispositif et système pour calculer la popularité d'une salle de retransmission en direct, et support de stockage WO2019136847A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810017883.5 2018-01-09
CN201810017883.5A CN108307246B (zh) 2018-01-09 2018-01-09 一种计算直播间人气的方法、存储介质、设备及系统

Publications (1)

Publication Number Publication Date
WO2019136847A1 true WO2019136847A1 (fr) 2019-07-18

Family

ID=62868826

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/081294 WO2019136847A1 (fr) 2018-01-09 2018-03-30 Procédé, dispositif et système pour calculer la popularité d'une salle de retransmission en direct, et support de stockage

Country Status (2)

Country Link
CN (1) CN108307246B (fr)
WO (1) WO2019136847A1 (fr)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109145533B (zh) * 2018-09-30 2021-11-26 武汉斗鱼网络科技有限公司 一种使用随机密码保护代码的方法及装置
CN109768978B (zh) * 2019-01-16 2021-05-25 武汉斗鱼鱼乐网络科技有限公司 一种混淆数据的方法及相关装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000055783A1 (fr) * 1999-03-12 2000-09-21 Netratings, Inc. Technique et dispositif permettant d'evaluer l'acces utilisateur a des donnees d'image
CN104639394A (zh) * 2015-01-05 2015-05-20 广州酷狗计算机科技有限公司 客户端使用人数的统计方法、装置和系统
CN105959729A (zh) * 2016-06-29 2016-09-21 武汉斗鱼网络科技有限公司 一种统计直播平台在线用户人数的方法及系统
CN105959728A (zh) * 2016-06-27 2016-09-21 武汉斗鱼网络科技有限公司 统计直播平台在线人数的系统及其方法

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4766487B2 (ja) * 2006-09-08 2011-09-07 株式会社ソニー・コンピュータエンタテインメント プログラム改ざん検出装置
CN107516547A (zh) * 2016-06-16 2017-12-26 中兴通讯股份有限公司 内存硬错误的处理方法及装置
CN107094261A (zh) * 2017-03-17 2017-08-25 武汉斗鱼网络科技有限公司 视频播放的权限校验方法及装置
CN107135408B (zh) * 2017-03-31 2020-06-12 武汉斗鱼网络科技有限公司 一种视频流地址的鉴权方法及装置
CN107465660B (zh) * 2017-06-30 2019-11-15 武汉斗鱼网络科技有限公司 一种视频流地址鉴权方法及装置
CN107454441B (zh) * 2017-06-30 2019-12-03 武汉斗鱼网络科技有限公司 一种检测直播间刷人气行为的方法、直播平台服务器及计算机可读存储介质
CN107333151B (zh) * 2017-06-30 2019-07-09 武汉斗鱼网络科技有限公司 一种视频流地址鉴权方法及装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2000055783A1 (fr) * 1999-03-12 2000-09-21 Netratings, Inc. Technique et dispositif permettant d'evaluer l'acces utilisateur a des donnees d'image
CN104639394A (zh) * 2015-01-05 2015-05-20 广州酷狗计算机科技有限公司 客户端使用人数的统计方法、装置和系统
CN105959728A (zh) * 2016-06-27 2016-09-21 武汉斗鱼网络科技有限公司 统计直播平台在线人数的系统及其方法
CN105959729A (zh) * 2016-06-29 2016-09-21 武汉斗鱼网络科技有限公司 一种统计直播平台在线用户人数的方法及系统

Also Published As

Publication number Publication date
CN108307246A (zh) 2018-07-20
CN108307246B (zh) 2020-02-07

Similar Documents

Publication Publication Date Title
CN111327643B (zh) 一种多方数据共享方法和装置
US10007960B2 (en) Electronic license management
CN108429719B (zh) 密钥保护方法及装置
JP2019516294A (ja) 仮想化環境においてネットワークトラフィックを解読するためのシステムおよび方法
KR20180120157A (ko) 데이터세트 추출 기반 패턴 매칭
US8806602B2 (en) Apparatus and method for performing end-to-end encryption
WO2017193750A1 (fr) Procédé de traitement permettant de présenter une attaque par copie, serveur et client
US8752157B2 (en) Method and apparatus for third party session validation
CN109558739B (zh) 程序运行方法、装置、终端及可读介质
WO2019001083A1 (fr) Procédé et dispositif d'authentification pour adresse de flux vidéo
CN106101133A (zh) 一种流媒体防盗链的方法及系统
WO2021051591A1 (fr) Procédé et appareil de réalisation de clavier sécurisé, ainsi que dispositif informatique et support de stockage
WO2019001082A1 (fr) Procédé et dispositif d'authentification pour adresse de flux vidéo
CN108259183B (zh) 一种关注方法、装置、电子设备及介质
CN108881966A (zh) 一种信息处理方法以及相关设备
CN108184146B (zh) 一种计算直播平台人气的方法及相关设备
WO2019136847A1 (fr) Procédé, dispositif et système pour calculer la popularité d'une salle de retransmission en direct, et support de stockage
CN113395406A (zh) 一种基于电力设备指纹的加密认证方法及系统
WO2019001084A1 (fr) Procédé et dispositif d'authentification d'une adresse de flux vidéo
CN109145533B (zh) 一种使用随机密码保护代码的方法及装置
CN104955043B (zh) 一种智能终端安全防护系统
CN108206961B (zh) 一种计算直播平台人气的方法及相关设备
WO2019136838A1 (fr) Procédé permettant d'empêcher le vol d'un flux vidéo, support de stockage, dispositif et système
WO2019136860A1 (fr) Procédé, appareil, dispositif électronique et support permettant de déterminer la légitimité d'un suivi
US20170142160A1 (en) Systems and Methods for Controlling Access to a Computer Device with Access Counting

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18899430

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18899430

Country of ref document: EP

Kind code of ref document: A1