CN110381334A - Anti-stealing-link method, device and system - Google Patents

Anti-stealing-link method, device and system Download PDF

Info

Publication number
CN110381334A
CN110381334A CN201910823357.2A CN201910823357A CN110381334A CN 110381334 A CN110381334 A CN 110381334A CN 201910823357 A CN201910823357 A CN 201910823357A CN 110381334 A CN110381334 A CN 110381334A
Authority
CN
China
Prior art keywords
live
target
address
fragment
current
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910823357.2A
Other languages
Chinese (zh)
Other versions
CN110381334B (en
Inventor
曹问
唐文滔
李兴平
盛骥斌
刘维
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan MgtvCom Interactive Entertainment Media Co Ltd
Original Assignee
Hunan MgtvCom Interactive Entertainment Media Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan MgtvCom Interactive Entertainment Media Co Ltd filed Critical Hunan MgtvCom Interactive Entertainment Media Co Ltd
Priority to CN201910823357.2A priority Critical patent/CN110381334B/en
Publication of CN110381334A publication Critical patent/CN110381334A/en
Application granted granted Critical
Publication of CN110381334B publication Critical patent/CN110381334B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2187Live feed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/254Management at additional data server, e.g. shopping server, rights management server
    • H04N21/2541Rights Management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data
    • H04N21/25816Management of client data involving client authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26606Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/441Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4623Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/835Generation of protective data, e.g. certificates
    • H04N21/8352Generation of protective data, e.g. certificates involving content or source identification data, e.g. Unique Material Identifier [UMID]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/83Generation or processing of protective or descriptive data associated with content; Content structuring
    • H04N21/845Structuring of content, e.g. decomposing content into time segments
    • H04N21/8456Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments

Landscapes

  • Engineering & Computer Science (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Graphics (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The invention relates to the technical field of internet live broadcast, in particular to a method, a device and a system for preventing a hotlink from being stolen. According to the method, before a player sends a live broadcast segment request to an edge node each time, a target authentication code is generated according to address expiration time, a current key group, live broadcast information and a live broadcast file name, the target authentication code, the address expiration time and a target key version number are packaged into a target live broadcast address and sent to the edge node, and after the edge node receives the live broadcast segment request which is sent by the player and carries the target live broadcast address, the target authentication code, the address expiration time and the target key version number in the target live broadcast address are subjected to anti-theft authentication. Due to the fact that the target authentication code, the address expiration time and the target key version number have timeliness, anti-theft authentication is conducted every time when a live broadcast fragment is obtained, an illegal user is prevented from obtaining live broadcast content in a link stealing mode, bandwidth cost is reduced, and economic loss of a live broadcast video provider is reduced.

Description

Anti-stealing link method, apparatus and system
Technical field
The present invention relates to internet direct seeding technique fields, more particularly to a kind of anti-stealing link method, apparatus and system.
Background technique
With the fast development of Internet technology and multimedia technology, there are more and more network direct broadcasting platforms, Network direct broadcasting platform provides various network direct broadcasting services, for example, game live streaming, amusement live streaming or match live streaming etc.. User can according to the live stream uniform resource locator (Uniform Resource Locator, URL) of network direct broadcasting platform It is flat to obtain network direct broadcasting from the fringe node of content distributing network (Content Delivery Network, CDN) system for location Live stream in platform, and user is flowed to according to live streaming by the player of network direct broadcasting platform and plays live video.
However, with the quick development of Internet technology, the live video provider of network direct broadcasting platform has to face Face a challenge, i.e. robber's chain.It steals chain and refers to that illegal user by certain technological means, cracks the live stream of network direct broadcasting platform Then the address URL is obtained using the address live stream URL stolen from the fringe node of CDN system by third-party player After live video, i.e. illegal user steal the address live stream URL provided by live video provider, provided around live video The player of side, using the player of itself after the fringe node acquisition live video of the CDN system of live video provider, With the behavior of the player plays live video of itself.Therefore, robber's chain behavior of illegal user increases network direct broadcasting platform Bandwidth cost and server resource bring serious economic loss to live video provider.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of anti-stealing link methods, in this way, by live stream to divide The form of sheet data is sent, and when each player obtains fragment data, will be carried out antitheft certification to live streaming address, be prevented Only illegal user obtains live content by stealing chain, reduces bandwidth cost, reduces the economic loss of live video provider.
The present invention also provides a kind of antitheft chain apparatus, to guarantee the realization and application of the above method in practice.
A kind of anti-stealing link method, the method are applied to fringe node, which comprises
When receiving the live streaming fragment request of player transmission, determination is corresponding wait be broadcast live with the live streaming fragment request Segment, and obtain the live information for including in the live streaming fragment request and target live streaming address;
Whether judge in the live information comprising timeslicing parameters corresponding with the live streaming fragment request;
If in the live information including timeslicing parameters corresponding with the live streaming fragment request, it is determined that the player The live streaming fragment request corresponding with target live streaming address not sent for the first time to the fringe node, and obtain the mesh Target authentication code, address aging time, target cipher key version number and the live file name for including in mark live streaming address;
According to the timeslicing parameters, target authentication code, address aging time, target cipher key version number and live file name, Antitheft certification is carried out to target live streaming address;
When the antitheft certification by the target being broadcast live address, segment entrained in the timeslicing parameters is obtained Number;
The current slice data to match with the fragment number are obtained, the current slice data are that the fringe node is real When read live stream in pre-set live streaming source station, will be described and according to burst information entrained in the live stream Live stream carries out the fragment data obtained after fragment, and the live stream is the corresponding live stream of the segment to be broadcast live;
Based on the fragment number, judge the current slice data whether be the live stream the last one fragment number According to;
If the current slice data are not the last one fragment data of the live stream, in the current slice number It is sent to the player according to middle insertion target timeslicing parameters, and by the current slice data for carrying target timeslicing parameters, is triggered Player plays current live segment corresponding with the current slice data, and according to the target timeslicing parameters to institute It states fringe node and sends live streaming fragment request corresponding with next live streaming segment, the target timeslicing parameters are next fragment data Timeslicing parameters;
If the current slice data are the last one fragment data of the live stream, institute is sent to the player Current slice data are stated, player plays current live segment corresponding with the current slice data are triggered, so that institute Player is stated after completing to play the current live segment, terminates live play.
Above-mentioned method, it is optionally, described close according to the timeslicing parameters, target authentication code, address aging time, target Key version number and live file name carry out antitheft certification to target live streaming address, comprising:
It determines request time corresponding with the live streaming fragment request, and judges whether the request time exceeds describedly Location expired time;
If the request time is sent without departing from the address aging time to pre-set authentication management server Secret key request message corresponding with the target cipher key version number;
It is being fed back according to the secret key request message with the target cipher key version when receiving the authentication management server When this number corresponding target cipher key group, according to the fragment number in the live file name and the timeslicing parameters, it is determining with it is described The corresponding target encryption method of target cipher key group;
Using the target encryption method, to the target cipher key version number, fragment number, live file name and address aging Time is encrypted, and current authentication code is generated;
The target authentication code is matched with the current authentication code, judges the target authentication code and described current Whether authentication code is consistent;
If the target authentication code is consistent with the current authentication code, recognized by the way that the antitheft of address is broadcast live to the target Card.
Above-mentioned method, optionally, further includes:
If not including timeslicing parameters corresponding with the live streaming fragment request in the live information, it is determined that the broadcasting The live streaming fragment request corresponding with target live streaming address that device is sent to the fringe node for the first time;
Target live streaming address is parsed, target authentication code, the address aging for including in target live streaming address are obtained Time, target cipher key version number and live file name;
According to the target authentication code, address aging time, target cipher key version number and live file name, to the target Address is broadcast live and carries out antitheft certification;
When by the target be broadcast live address antitheft certification when, read in real time in pre-set live streaming source station with institute State the corresponding live stream of segment to be broadcast live, and live streaming picture group GOP data corresponding with the live stream;
The GOP data are sent to the player, trigger the player according to the GOP data playback with it is described The corresponding live streaming picture of live stream;
The burst information for including in the live stream is obtained, and fragment is carried out to the live stream according to the burst information Processing, obtains multiple fragment datas;
Each fragment data is subjected to label according to playing sequence corresponding with the live stream, and by label And first fragment data for carrying next timeslicing parameters is sent to the player, triggers the player to described first Fragment data is parsed, and is obtained current live segment and is broadcast live broadcasting, and requests again according to next timeslicing parameters The fringe node obtains next fragment data.
Above-mentioned method, optionally, further includes:
The quantity of generated each fragment data corresponding with the live stream in fringe node described in real-time detection;
When the quantity of each timeslicing parameters corresponding with the live stream in the fringe node is more than pre-set deposit When storing up quantity, time earliest fragment data will be generated and deleted, so that corresponding with the live stream point in the fringe node The quantity of sheet data is no more than the storage quantity.
Above-mentioned method, optionally, further includes:
When the antitheft certification not by the target being broadcast live address, interrupts and sent and the segment to the player Number corresponding fragment data.
A kind of antitheft chain apparatus, comprising:
First acquisition unit, for determining and the live streaming piece when receiving the live streaming fragment request of player transmission Section requests corresponding segment to be broadcast live, and obtains the live information for including in the live streaming fragment request and target live streaming address;
First judging unit, for judge in the live information whether include and corresponding point of the live streaming fragment request Piece parameter;
First determination unit, if for joining in the live information comprising fragment corresponding with the live streaming fragment request Number, it is determined that the player is not the live streaming piece corresponding with target live streaming address sent for the first time to the fringe node Section request, and obtain the target authentication code for including in target live streaming address, the address aging time, target cipher key version number and Live file name;
Authentication unit, for according to the timeslicing parameters, target authentication code, address aging time, target cipher key version number And live file name, antitheft certification is carried out to target live streaming address;
Second acquisition unit, for when the antitheft certification by the target being broadcast live address, obtaining the fragment ginseng Entrained fragment number in number;
Third acquiring unit, for obtaining the current slice data to match with the fragment number, the current slice number According to the live stream read in real time for the fringe node in pre-set live streaming source station, and according to entrained in the live stream Burst information, the live stream is subjected to the fragment data that obtains after fragment, the live stream is the segment pair to be broadcast live The live stream answered;
Second judgment unit judges whether the current slice data are the live stream for being based on the fragment number The last one fragment data;
First trigger unit, if for the current slice data not being the last one fragment data of the live stream, It is then embedded in target timeslicing parameters in the current slice data, and the current slice data for carrying target timeslicing parameters are sent To the player, player plays current live segment corresponding with the current slice data is triggered, and according to institute It states target timeslicing parameters and sends live streaming fragment request corresponding with next live streaming segment, the target fragment to the fringe node Parameter is the timeslicing parameters of next fragment data;
Second trigger unit, if being the last one fragment data of the live stream for the current slice data, The current slice data are sent to the player, trigger that the player plays are corresponding with the current slice data to be worked as Preceding live streaming segment, so that the player after completing to play the current live segment, terminates live play.
A kind of anti-stealing link method, the method are applied to player, which comprises
When receiving live play triggering command every time, live streaming letter corresponding with the live play triggering command is obtained Breath, and determine segment to be broadcast live corresponding with the live information;
Key request is sent to pre-set authentication management server, and receives the authentication management server according to institute The current key group of key request feedback is stated, determines current key version number corresponding with the current key group;
Detecting the player whether there is live streaming address corresponding with the segment to be broadcast live;
When the player is not present with described when segment corresponding live streaming address is broadcast live, to pre-set scheduler Send Address requests corresponding with the segment to be broadcast live;
When receiving the current live address that the scheduler is fed back according to the Address requests, it is arranged and described current The address corresponding address aging time is broadcast live;
The current live address is parsed, live file name corresponding with the live information is obtained;
According to the address aging time, current key group, live information and live file name, target authentication code is generated, And encapsulate the target authentication code, address aging time and current key version number into the current live address, it obtains Address is broadcast live in target;
The live streaming segment for carrying the target live streaming address and the live information is sent to pre-set fringe node Request triggers the fringe node according to the target authentication code in the live information and target live streaming address, address mistake Time phase, live file name and current key version number carry out antitheft certification;
When receiving the current slice data corresponding with the live streaming fragment request of the fringe node feedback, determine The fringe node passes through to the antitheft of the target authentication code, address aging time, live file name and current key version number Certification, and the current slice data are parsed, obtain current live segment corresponding with the current slice data;
The current live segment is played out on the pre-set display page, and in the currently playing segment Playing process in, detect the current slice data with the presence or absence of target timeslicing parameters, the target timeslicing parameters are next The timeslicing parameters of fragment data;
If the current slice data include the target timeslicing parameters, it is determined that the current slice data are to broadcast Triggering command is put, and generates the live information of next segment to be broadcast live according to the target timeslicing parameters, executes the broadcasting Device is every time to the process of fringe node request live streaming segment to be played;
If the current slice data do not include the target timeslicing parameters, broadcasting for the current live segment is completed When putting, terminate live play process.
Above-mentioned method, it is optionally, described according to the address aging time, current key group, live information and live streaming Filename generates target authentication code, comprising:
It whether detects in the live information comprising timeslicing parameters corresponding with the segment to be broadcast live;
It is literary according to the live streaming when not including with described when segment corresponding timeslicing parameters are broadcast live in the live information Part name generates encryption method corresponding with the current key group;
The live file name, key group version number and address aging time are encrypted using the encryption method, Generate target authentication code.
Above-mentioned method optionally receives the working as corresponding with the live streaming fragment request of the fringe node feedback Before preceding fragment data, further includes:
The fringe node is received by returning to live streaming picture corresponding with the segment to be broadcast live after the antitheft certification Face group GOP data;
Parse the GOP data, play live streaming picture corresponding with the GOP data, and receive the fringe node according to The fragment data returned according to the live information.
Above-mentioned method, optionally, further includes:
When in the live information comprising when segment corresponding timeslicing parameters are broadcast live, obtaining the fragment ginseng with described Number, and parse the fragment number that the timeslicing parameters obtain fragment data to be obtained;
According to the live file name and the fragment number, the determining current encryption method with the current key group;
Using the current encryption method, when to the live file name, key group version number, fragment number and address aging Between encrypted, generate target authentication code.
Above-mentioned method, optionally, the detection current slice data whether there is target timeslicing parameters, comprising:
The each piecemeal field for including in the fragment data is obtained, and in the playing process of the current live segment In, successively parse each piecemeal field;
When parsing to target segment field, detects whether to carry in the target segment field and join with the target fragment The corresponding fragment number of number, the target segment field are the penultimate piecemeal field in each piecemeal field;
If carrying fragment number corresponding with the target timeslicing parameters in the target segment field, it is determined that described current There are the target timeslicing parameters for fragment data;
If fragment number corresponding with the target timeslicing parameters is not carried in the target segment field, it is determined that described to work as The target timeslicing parameters are not present in preceding fragment data.
A kind of antitheft chain apparatus, comprising:
4th acquiring unit, for obtaining and being touched with the live play when receiving live play triggering command every time Send instructions corresponding live information, and determines segment to be broadcast live corresponding with the live information;
First transmission unit for sending key request to pre-set authentication management server, and receives the mirror The current key group that authority management server is fed back according to the key request determines corresponding with the current key group current close Key version number;
First detection unit, for detecting the player with whether there is live streaming corresponding with the segment to be broadcast live Location;
Second transmission unit, for being not present with described when segment corresponding live streaming address is broadcast live when the player, To pre-set scheduler dispatches Address requests corresponding with the segment to be broadcast live;
Setting unit, for when receiving the current live address that the scheduler is fed back according to the Address requests, The address aging time corresponding with the current live address is set;
First resolution unit obtains live streaming text corresponding with the live information for parsing the current live address Part name;
Generation unit, for according to the address aging time, current key group, live information and live file name, life It encapsulates at target authentication code, and by the target authentication code, address aging time and current key version number to described current straight It broadcasts in address, obtains target and address is broadcast live;
Third transmission unit carries target live streaming address and described straight for sending to pre-set fringe node The live streaming fragment request for broadcasting information triggers the fringe node according in the live information and target live streaming address Target authentication code, address aging time, live file name and current key version number carry out antitheft certification;
Second resolution unit, for corresponding with the live streaming fragment request current when receiving the fringe node feedback When fragment data, determine that the fringe node passes through to the target authentication code, address aging time, live file name and current close The antitheft certification of key version number, and the current slice data are parsed, it obtains corresponding with the current slice data current straight Broadcast segment;
Second detection unit, for the current live segment to be played out on the pre-set display page, and In the playing process of the currently playing segment, detecting the current slice data whether there is target timeslicing parameters, described Target timeslicing parameters are the timeslicing parameters of next fragment data;
Execution unit, if including the target timeslicing parameters for the current slice data, it is determined that described current point Sheet data is live play triggering command, and the live streaming letter of next segment to be broadcast live is generated according to the target timeslicing parameters Breath executes the player every time to the process of fringe node request live streaming segment to be played;
End unit is worked as described in the completion if not including the target timeslicing parameters for the current slice data When the broadcasting of preceding live streaming segment, terminate live play process.
A kind of anti-stealing link system, comprising:
Fringe node, player, live streaming source station, scheduler and authentication management server;
The fringe node, the live stream for being sent for receiving the live streaming source station, and according in the live stream Burst information, by the live streaming flow fragmentation at multiple fragment datas;When the player sends live streaming fragment request, execute Such as the method for above-mentioned door chain;
The player, for executing the method such as above-mentioned door chain when receiving live play triggering command every time;
The live streaming source station, for for the insertion per live stream all the way and burst information corresponding per live stream all the way, and by The live stream for being inserted into burst information is sent to the fringe node;
The scheduler, for being the broadcasting according to the Address requests when receiving the Address requests of player Device feedback live streaming address;
The authentication management server, for generating new key group in real time, by pre-set api interface with it is described Fringe node and player connection, so that the fringe node and the player obtain key by the api interface Group.
Compared with prior art, the present invention includes the following advantages:
The present invention provides a kind of anti-stealing link method, in this way, sending live streaming to fringe node every time from player Before fragment request, first according to address expired time, current key group, live information and live file name, target authentication code is generated, The target authentication code and target cipher key version number are encapsulated into target live streaming address again, fringe node is receiving player hair After the live streaming fragment request that the carrying target live streaming address sent is sent, antitheft certification is carried out.Due to address aging time and target Authentication code and target cipher key version number have timeliness, will carry out antitheft certification in each acquisition live streaming segment, prevent non- Method user obtains live content by stealing chain mode, reduces bandwidth cost, reduces the economic loss of live video provider.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of method flow diagram of anti-stealing link method provided in an embodiment of the present invention;
Fig. 2 is a kind of method schematic diagram of anti-stealing link method provided in an embodiment of the present invention;
Fig. 3 is a kind of another method schematic diagram of anti-stealing link method provided in an embodiment of the present invention;
Fig. 4 is a kind of structure drawing of device of antitheft chain apparatus provided in an embodiment of the present invention;
Fig. 5 is a kind of another method flow diagram of anti-stealing link method provided in an embodiment of the present invention;
Fig. 6 is a kind of another structure drawing of device of antitheft chain apparatus provided in an embodiment of the present invention;
Fig. 7 is a kind of system construction drawing of anti-stealing link system provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In this application, relational terms such as first and second and the like be used merely to by an entity or operation with Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities The relationship on border perhaps sequence the terms "include", "comprise" or any other variant thereof is intended to cover non-exclusive inclusion, from And to include the process, method, article or equipments of a series of elements not only to include those elements, but also including not bright The other element really listed, or further include for elements inherent to such a process, method, article, or device.Do not having In the case where more limitations, the element that is limited by sentence "including a ...", it is not excluded that include the element process, There is also other identical elements in method, article or equipment.
The present invention can be used in numerous general or special purpose computing device environment or configurations.Such as: personal computer, service Device computer, handheld device or portable device, laptop device, multi-processor device including any of the above devices or devices Distributed computing environment etc..
The embodiment of the invention provides a kind of anti-stealing link method, this method can be applied in multiple systems platform, be executed Main body can be the fringe node in CDN system, and the method flow diagram of the method is as shown in Figure 1, specifically include:
S101: when receiving the live streaming fragment request of player transmission, determination is corresponding with the live streaming fragment request Segment to be broadcast live, and obtain the live information for including in the live streaming fragment request and target live streaming address;
In embodiments of the present invention, when fringe node receives the live streaming fragment request of player transmission, determine that this is broadcast Put the segment to be broadcast live for the broadcasting that device to be requested.Obtain the live information for including in the live streaming fragment request and target live streaming ground Location.It wherein, include live streaming room number, main broadcaster's title, live streaming type etc. in the live information.It is to obtain to be somebody's turn to do that address, which is broadcast live, in the target The corresponding address of segment to be broadcast live.
S102: whether judge in the live information comprising timeslicing parameters corresponding with the live streaming fragment request;
In embodiments of the present invention, whether judge in the live information comprising timeslicing parameters.That is, it is judged that the live streaming segment is asked Seeking Truth is no to send live streaming fragment request corresponding with segment to be broadcast live is somebody's turn to do to fringe node for the first time for the player.
S103: if in the live information including timeslicing parameters corresponding with the live streaming fragment request, it is determined that described Player is not the live streaming fragment request corresponding with target live streaming address sent for the first time to the fringe node, and is obtained Target authentication code, address aging time, target cipher key version number and the live file name for including in target live streaming address;
In embodiments of the present invention, if containing timeslicing parameters in the live information, show the live streaming fragment request not It is that the player sends live streaming fragment request corresponding with the segment to be broadcast live to fringe node for the first time, i.e., receives at this Before the live streaming fragment request, which has sent upper live streaming fragment request corresponding with the live stream, and obtains one Segment is broadcast live.Meanwhile obtaining the target authentication code for including in target live streaming address, address aging time, target cipher key version Number and live file name.Wherein, the target authentication code, address aging time and target cipher key version number have encapsulated in advance to the mesh In mark live streaming address.
It should be noted that the address aging time is the expired time that address is broadcast live in the target.Each live streaming address All it is time-effectiveness, has spent the address aging time corresponding with the live streaming address, then the fringe node will not be anti-to player Feedback live streaming segment.
S104: according to the timeslicing parameters, target authentication code, address aging time, target cipher key version number and live streaming text Part name carries out antitheft certification to target live streaming address;
In embodiments of the present invention, the fringe node is according to timeslicing parameters, target authentication code, address aging time, target Key version number and live file name carry out antitheft certification to target live streaming address, are non-to prevent target live streaming address After address is broadcast live by the target that illegal means is stolen in method user, live streaming is obtained using illegal technical modelling target live streaming address Segment.
It should be noted that address mould can be broadcast live according to the target after if illegal user steals target live streaming address The target authentication in live streaming address intending a similar live streaming address, but simulating, address aging time and target cipher key version This number may be changed, therefore player feedback live streaming segment can be determined whether by antitheft certification.
S105: it when the antitheft certification by the target being broadcast live address, obtains in the timeslicing parameters entrained Fragment number;
In embodiments of the present invention, when target live streaming address is by the antitheft certification of the fringe node, then the mesh is proved Mark live streaming address is not the live streaming address that illegal user is stolen by illegal means.At this point, the fringe node obtains the fragment The fragment number carried in parameter.
S106: obtaining the current slice data to match with the fragment number, and the current slice data are the edge Node reads the live stream in pre-set live streaming source station in real time, and according to burst information entrained in the live stream, The live stream is carried out to the fragment data obtained after fragment, the live stream is the corresponding live stream of the segment to be broadcast live;
In embodiments of the present invention, it after getting the fragment number, is obtained and the fragment number phase according to the fragment number The fragment data matched.Wherein, which is the live stream that the fringe node reads that live streaming source station is sent in real time, straight according to this The burst information in stream is broadcast, the fragment data obtained after fragment is carried out to the live stream.
It should be noted that live streaming source station is that each is straight after receiving the live stream that each live streaming plug-flow end is sent It broadcasts stream and is all inserted into burst information.The burst information may include that corresponding live stream should obtain after fragment sequence number, fragment The playing duration of live streaming segment corresponding to each timeslicing parameters obtained.
S107: be based on the fragment number, judge the current slice data whether be the live stream the last one point Sheet data;
In embodiments of the present invention, according to the fragment number, judge whether the current slice data are the live stream The last one fragment data, that is, judge the fragment number whether be the fringe node be the live stream carry out fragment after the last one Fragment data.
S108: if the current slice data are not the last one fragment data of the live stream, described current It is embedded in target timeslicing parameters in fragment data, and the current slice data for carrying target timeslicing parameters are sent to the broadcasting Device triggers player plays current live segment corresponding with the current slice data, and according to the target fragment Parameter sends live streaming fragment request corresponding with next live streaming segment to the fringe node, and the target timeslicing parameters are next The timeslicing parameters of fragment data;
It in embodiments of the present invention, will be next if current slice data are not the last one fragment data of live stream In the timeslicing parameters insertion current slice data of a fragment data.It, should i.e. when sending the current slice number data to player The timeslicing parameters of next fragment data are carried in current slice data.It wherein, include next fragment to be obtained in the timeslicing parameters The fragment number of data.Player can determine the live streaming whether processing is over according to the timeslicing parameters in current slice data, if working as There are timeslicing parameters in preceding fragment data, then prove to continue to fringe node request under there are also next section of fragment data The corresponding live streaming segment of one section of fragment data.
It should be noted that when needing to obtain fragment data, side receives fringe node since live streaming is real-time perfoming Live stream side carries out fragment to the live stream, while also needing for the fragment data of fragment to be sent to according to live streaming fragment request and broadcast Put device.
S109: if the current slice data are the last one fragment data of the live stream, to the player The current slice data are sent, player plays current live segment corresponding with the current slice data is triggered, So that the player after completing to play the current live segment, terminates live play.
In embodiments of the present invention, if current slice data are the last one fragment data of live stream, show the fragment The corresponding live streaming segment of data is the last one live streaming segment of live stream, then sends current slice data to player.Wherein, The current fragment data does not include timeslicing parameters.The current slice data for not including timeslicing parameters are sent to player, this is broadcast Live streaming segment corresponding with the fragment data can be played to the current fragment data by putting device, and after playing the live streaming segment, Terminate live play.
The present invention is implemented in the anti-stealing link method provided, and it is straight to parse this after receiving live streaming fragment request for fringe node The live information in fragment request is broadcast, to determine whether there is timeslicing parameters.If it does not exist, then prove that the live streaming fragment request is Fragment request is broadcast live for the first time;If it exists, then prove that fragment request is broadcast live to be non-in the live streaming fragment request for the first time.When in live information There are when timeslicing parameters, address is broadcast live according to the target in the live streaming fragment request, obtains in target live streaming address and includes Target authentication code, address aging time, target cipher key version number and live file name.When by target authentication code, address aging Between, target cipher key version number, live file name and timeslicing parameters antitheft certification is carried out to target live streaming address, to determine whether There are illegal users to be broadcast live address viewing live streaming by usurping target.If certification passes through, prove that there is currently no illegal users Address is broadcast live by the target stolen to be broadcast live by third party's player plays.Fringe node is according to the segment for including in timeslicing parameters Number, obtain the current slice data to match with the fragment number, and judge the fragment data whether be and the live streaming fragment request The last one fragment data of corresponding live stream.If not the last one fragment data, then in this prior in fragment data It is embedded in the timeslicing parameters of next fragment data.It, then will not be again in current slice data if it is the last one fragment data It is embedded in timeslicing parameters.The fringe node is after sending player for the current fragment data, and the player is according to this current point Sheet data is broadcast live segment broadcasting.Meanwhile if in the current fragment data including the timeslicing parameters of next fragment data, Player can be sent corresponding with next fragment data straight according to the timeslicing parameters of next fragment data to fringe node Broadcast fragment request.If the current fragment data does not include the timeslicing parameters of next fragment data, complete in the player plays After live streaming segment corresponding with the current fragment data, terminate live play.
It should be noted that player includes after getting current slice data, according in the current fragment data When timeslicing parameters send live streaming fragment request next time to the fringe node, which is being received and next fragment number After corresponding live streaming fragment request, the process of above-mentioned steps S101~S108 is executed.Until current fragment data is last One fragment data.
It should also be noted that, the fringe node is when sending the current fragment data to player, using http piecemeal The mode of transmission coding HTTP Chunked Encoding sends fragment data to player.Wherein, include in the fragment data Multiple piecemeal field chunk, and the extended field chunk_ of the previous chunk in the last one piecemeal field last_chunk Next timeslicing parameters are embedded in ext.Player side plays live streaming segment corresponding with current slice data, and side is read each chunk。
Using in method provided in an embodiment of the present invention, when receiving the live streaming fragment request of player transmission every time, Antitheft certification is carried out to the target live streaming address in live streaming fragment request, and sends to player after certification passes through and piece is broadcast live The corresponding fragment data of section, so that player every time when needing to play live streaming segment, sends live streaming segment to fringe node and asks It asks, and to carry out antitheft certification every time.Thus can guarantee can effectively recognise that there are illegal users to steal Chain.Guarantee that the live streaming resource of network direct broadcasting platform is not stolen, reduce bandwidth cost, prevent live video provider it is economical by To loss.
Optionally, it is based on above-mentioned steps S104, when by fringe node according to timeslicing parameters, target authentication code, address aging Between, after target cipher key version number and live file name carry out antitheft certification, specifically further include:
When the antitheft certification not by the target being broadcast live address, interrupts and sent and the segment to the player Number corresponding fragment data.
In method provided in an embodiment of the present invention, if fringe node is to timeslicing parameters, target authentication code, address aging Between, target cipher key version number and live file name carry out authentification failure after antitheft certification, then prove that target live streaming address may It is illegal user after stealing live streaming address, live streaming fragment request is sent by third party's player.The live streaming being stolen at this time Target authentication code, address aging time, target cipher key version number and live file name in address are all mismatched or are not present, because This certification will not pass through.And address aging time specific timeliness, even if after stealing target live streaming address by illegal user, if Current time exceeds the address aging time, and illegal user can not also obtain live streaming segment.
In method provided in an embodiment of the present invention, it is based on above-mentioned steps S104, it is described to recognize according to the timeslicing parameters, target Code, address aging time, target cipher key version number and live file name are demonstrate,proved, antitheft certification is carried out to target live streaming address Process is as shown in Fig. 2, specifically include:
S201: it determines request time corresponding with the live streaming fragment request, and judges whether the request time exceeds The address aging time;
In embodiments of the present invention, target authentication code, address aging time, target cipher key version number and live streaming are being got After filename, first judge whether the request time of current request live streaming segment is expired.I.e. whether the request time exceeds the address Expired time.For example, request time is 11 points of July 1 in 2019 when address expired time is 00 minute 12 points of on July 1st, 2019 58 timesharing, the request time are not out of date.It is 12: 01 timesharing on July 1 in 2019 between upon request, the request time is out of date.
Optionally, the address aging time of target live streaming address is set by pre-set authentication management server It sets.The time of address can be broadcast live in authentication management server according to player requests, and address expired time is arranged.For example, player The time that address is broadcast live in current request is 55 minutes 11 points of on July 1st, 2019, then it is 2019 7 that the address aging time, which can be set, Month 1 day 12 points 00 minute.
Further, the address aging time can also by player receive scheduler feedback live streaming address after, The address aging time corresponding with the live streaming address is set.
S202: if the request time without departing from the address aging time, to pre-set authentication management service Device sends secret key request message corresponding with the target cipher key version number;
In embodiments of the present invention, if the address aging time is within the request time, show the non-mistake of the request time Phase, within the effective time of target live streaming address.At this point, the fringe node will be sent and the key to authentication management server The corresponding secret key request message of version number.
It should be noted that saving multiple key groups in the authentication management server, and raw according to period regular hour At a key group, each key group has a corresponding key version number.When fringe node needs to manage to authentication When managing server transmission key request, which is sent by the api interface connected between authentication management server.
S203: when receive the authentication management server fed back according to the secret key request message it is close with the target When the corresponding target cipher key group of key version number, according to the fragment number in the live file name and the timeslicing parameters, determine with The corresponding target encryption method of the target cipher key group;
In embodiments of the present invention, authentication management server receive fringe node transmission secret key request message after, Target cipher key group corresponding with the secret key request message is fed back to fringe node.When fringe node is receiving authentication management clothes When the target cipher key group for device feedback of being engaged in, according to the fragment number in live file name and timeslicing parameters, the determining and target cipher key group Corresponding target encryption method.
Wherein, which can be Hash calculation algorithm MD5, shal Encryption Algorithm etc..
S204: the target encryption method is applied, to the target cipher key version number, fragment number, live file name and ground Location expired time is encrypted, and current authentication code is generated;
In embodiments of the present invention, after determining target encryption method corresponding with the target cipher key group, using the encryption Method adds the address aging time in target live streaming address, and target cipher key group corresponding with target cipher key version number It is close, generate current authentication code.
It should be noted that current authentication code, address aging time, target authentication code and target cipher key version number are all The form of plaintext.Optionally, the current authentication code, which can be, carries out coding acquisition by base64 coding mode, using the encryption Method encrypts address expired time, live file name, fragment number and target cipher key version number.Wherein base64 coding allows Target authentication code is converted into printable text after encryption;
S205: the target authentication code is matched with the current authentication code, judges the target authentication code and institute Whether consistent state current authentication code;
In the embodiment of the present invention, since target authentication code is consistent with the generating process of current authentication code, target is recognized Card code is matched with current authentication code, judges the consistency of target authentication code Yu current authentication code, it may be determined that target live streaming Whether address is that illegal user is used to steal the illegal address that resource is broadcast live.That is, player is sending live streaming piece to fringe node Before section request, encryption method also is generated using live file name and fragment number, and by the encryption method of generation to live file Name, target cipher key group and address aging time carry out encryption and generate target authentication code.
S206: if the target authentication code is consistent with the current authentication code, by the way that address is broadcast live to the target Antitheft certification.
In embodiments of the present invention, if the target authentication code is consistent with current authentication code, prove that address is broadcast live in the target Not for illegal user by analogue data interface or from back door steal live streaming address after, by third-party player into Row obtains live streaming segment, therefore fringe node passes through the antitheft certification to target live streaming address.
In anti-stealing link method provided in an embodiment of the present invention, during carrying out antitheft certification, prejudges and be broadcast live Whether the corresponding request time of fragment request exceeds the address aging time of target live streaming address.If request time is beyond address Expired time then proves target live streaming address also within term of validity.Meanwhile key request is sent to authentication management server Message wherein includes the corresponding target cipher key version number of key group of request in the secret key request message.Work as authentication management After server receives secret key request message, the target cipher key version number is obtained from the secret key request message, and according to the mesh Mark key version number obtains the pre-stored target cipher key group to match with the target cipher key version number, and by the target cipher key Group is sent to fringe node.Fringe node is straight according to target after the target cipher key group for receiving the transmission of authentication management server The fragment number of the live file name and timeslicing parameters in address is broadcast, determines encryption method corresponding with the target cipher key group, and lead to It crosses the encryption method to encrypt target cipher key version number, fragment number, live file name and address aging time, generate current Authentication code.It verifies current authentication code and whether target authentication code is consistent, antitheft certification passes through if consistent.
It should be noted that address aging time and target cipher key version number all have timeliness.Player is being sent out every time When sending live streaming fragment request, address aging time and target cipher key version number and the last live streaming fragment request sent are not necessarily It is identical, further prevent stealing chain person according to the live streaming address acquisition live streaming resource stolen.
Optionally, if target authentication code and current authentication code are inconsistent, prove that target live streaming address is illegal user The live streaming address obtained by back door.Illegal user asks after stealing target live streaming address by third party's player When seeking acquisition live streaming segment, live file name, the target cipher key group etc. in the live streaming address can not be obtained.And since address is broadcast live All time-effectiveness confirm target live streaming address for illegal user's use once having spent the address aging time of target live streaming address To obtain the live streaming address of live streaming segment.
Further, if the target authentication code for including in target live streaming address, address mistake has not been obtained in fringe node Any one in time phase, target cipher key version number and live file name, then it is assumed that there is currently illegal users using illegal The live streaming address that approach obtains carries out obtaining live streaming segment.
Using method provided in an embodiment of the present invention, since illegal user is straight using stealing by third party's player When broadcasting address and being broadcast live fragment request, key group can not be obtained, even if obtaining key group, address aging time and current close Key version number also time-effectiveness, therefore illegal user can not utilize the live streaming address duration request live streaming segment stolen.Edge section Point is guaranteed that the live streaming resource of network direct broadcasting platform is not stolen, is dropped by the antitheft certification to address expired time and authentication code Low bandwidth cost prevents the economy of live video provider from incurring loss.
In method provided in an embodiment of the present invention, whether comprising being asked with the live streaming segment in determining the live information After seeking corresponding timeslicing parameters, the detailed process not comprising timeslicing parameters is as shown in figure 3, specific further include:
S301: if not including timeslicing parameters corresponding with the live streaming fragment request in the live information, it is determined that institute State the live streaming fragment request corresponding with target live streaming address that player is sent to the fringe node for the first time;
In embodiments of the present invention, after parsing live information, if not including in the live information and live streaming fragment request When corresponding timeslicing parameters, show that the live streaming fragment request is that fragment request is broadcast live for the first time, i.e., the player is for the first time to edge Node requests live streaming fragment request corresponding with the live stream.
S302: parsing target live streaming address, obtains the target authentication code for including in target live streaming address, address Expired time, target cipher key version number and live file name;
In embodiments of the present invention, the target live streaming address for including in the live streaming fragment request is obtained, and to the target After live streaming address is parsed, it is close to obtain target authentication code entrained in target live streaming address, address aging time, target Key version number and live file name.
It should be noted that obtaining the target for including in target live streaming address in step S302 and above-mentioned steps S103 Authentication code, address aging time, the process of target cipher key version number and live file name are consistent, but the target in step S302 is straight Broadcasting address is the corresponding live streaming address of fragment request to be broadcast live for the first time, and the target live streaming address in step S103 is not broadcast live for the first time The corresponding live streaming address of fragment request.
S303: according to the target authentication code, address aging time, target cipher key version number and live file name, to institute It states target live streaming address and carries out antitheft certification;
In embodiments of the present invention, due to the live streaming fragment request for fragment request is broadcast live for the first time, and in live information not Comprising timeslicing parameters, therefore, the fringe node then according to the target authentication code, the address aging time, target cipher key version number and Live file name carries out antitheft certification to target live streaming address.
It should be noted that the antitheft verification process of step S303 is similar to the antitheft verification process of above-mentioned steps S104. Wherein, the antitheft verification process in above-mentioned steps S104 contains timeslicing parameters, and in the antitheft verification process of step S303 not Include timeslicing parameters.
S304: when the antitheft certification by the target being broadcast live address, pre-set live streaming source station is read in real time In live stream corresponding with the segment to be broadcast live, and live streaming picture group GOP data corresponding with the live stream;
In embodiments of the present invention, when antitheft certification passes through, then live stream corresponding with the live streaming fragment request is read, An and nearest GOP data corresponding with the live stream.Wherein, which issued by source station is broadcast live, edge Node updates GOP data after receiving live stream, according to the live stream.
S305: being sent to the player for the GOP data, triggers the player according to the GOP data playback Live streaming picture corresponding with the live stream;
In embodiments of the present invention, GOP data corresponding with live stream are sent in player, triggering player according to The picture group plays out live streaming picture corresponding with the live stream.Wherein, when fringe node is when receiving live stream, all can Update GOP data corresponding with the live stream.Therefore, it when receiving playing request for the first time, will be sent for player straight with this Broadcast the GOP data of stream recent renewal.
S306: the burst information for including in the live stream is obtained, and the live streaming is flowed into according to the burst information Row segment processing obtains multiple fragment datas;
In embodiments of the present invention, the live stream issued according to live streaming source station obtains the fragment letter for including in the live stream Breath.The burst information is that source station is broadcast live when receiving every live stream all the way that live streaming end is sent, all to insert per live stream all the way Enter corresponding burst information.Fringe node carries out fragment according to the burst information carried in the live stream, by the live stream, Obtain multiple fragment datas.Wherein, the corresponding one section of live streaming segment of each fragment data.
S307: each fragment data is subjected to label according to playing sequence corresponding with the live stream, and will Label and carry the first of next timeslicing parameters fragment data and be sent to the player, trigger the player to described First fragment data is parsed, and is obtained current live segment and is broadcast live broadcasting, and again according to next timeslicing parameters The secondary request fringe node obtains next fragment data.
In embodiments of the present invention, after live stream is carried out fragment by fringe node, by each fragment data according to live stream The playing sequence of each live streaming segment carries out label, when first fragment data is sent player, first fragment The timeslicing parameters of next fragment data are carried in data.Wherein, which is corresponding with the first live streaming segment First fragment data.Such as live stream is divided into 10 fragment datas, then the sequence of label is then 1~10.At this point, edge The corresponding timeslicing parameters of No. 2 fragment datas are embedded in No. 1 fragment number before it will send No. 1 fragment data to player by node It,, can be in No. 1 fragment data when player parses No. 1 fragment data after No. 1 fragment data is sent to player in The timeslicing parameters of No. 2 fragment datas are obtained, the player can request again side according to the timeslicing parameters of No. 2 fragment datas at this time Edge node obtains live streaming segment corresponding with No. 2 fragment datas.
It should be noted that since live streaming is the process of real-time perfoming, when receiving first live streaming fragment request, currently The corresponding fragment number of the fragment data got is not necessarily No. 1.And fragment data is being sent to player from fringe node In the process, it is that live stream is read on side, sends fragment data to player in fragment.
In anti-stealing link method provided in an embodiment of the present invention, if not including timeslicing parameters in live information, i.e., fragment is joined Number is default, it is determined that live streaming fragment request transmitted by player is that fragment request is broadcast live for the first time.Fragment request is broadcast live in this for the first time For player, request fringe node plays live streaming request corresponding with the live stream for the first time.Fringe node is according to the live streaming segment The target live streaming address for including in request, obtains the target authentication code for including in target live streaming address, address aging time, mesh Mark key version number and live file name.And according to target authentication code, address aging time, target cipher key version number and live streaming text Part name carries out antitheft certification.Wherein, the process of the antitheft certification are as follows: judge current request live streaming segment request time whether mistake Phase.I.e. whether the request time exceeds the address aging time.If, according to the key version number, being managed to authentication without expired It manages server and sends key request corresponding with the target cipher key version number.When receive authentication management server feedback with this When the corresponding target cipher key group of target cipher key version number, fringe node is determining with the target cipher key group pair according to live file name The encryption method answered, and the target cipher key group and address aging time are encrypted using the encryption method, it obtains target and recognizes Code is demonstrate,proved, target authentication code is matched with current authentication code, matching unanimously then passes through antitheft certification.Passing through antitheft certification Afterwards, the live stream currently issued and GOP data corresponding with the live stream are obtained.Wherein, which is fringe node reception To after live stream, the picture group data that are updated according to the live stream.It is played out GOP data are sent to player Afterwards, according to burst information entrained in live stream, fragment is carried out to the live stream, obtains multiple fragment datas.To each it divide Sheet data carries out label, and first fragment data is sent to player, triggers player according to first fragment data Corresponding with first fragment data live streaming segment is played, and player is when playing live streaming segment, to first fragment Data are parsed, and the timeslicing parameters of next fragment data are obtained, at this point, player can join according to the fragment of next fragment data Number requests fringe node to obtain live streaming segment corresponding with next fragment data.
It should be noted that being played when fringe node is after sending first fragment data to player when receiving Device according to the timeslicing parameters carried in first fragment data again request live streaming segment when, execute above-mentioned steps S101~ The process of S108 will not repeat again herein.
It also will be to the target when not including timeslicing parameters in live information using method provided in an embodiment of the present invention Address is broadcast live and carries out antitheft certification, guarantees that the live streaming resource of network direct broadcasting platform is not stolen, reduces bandwidth cost, prevent from being broadcast live The economy of video provider incurs loss.
In method provided in an embodiment of the present invention, optionally, further includes:
The quantity of generated each fragment data corresponding with the live stream in fringe node described in real-time detection;
When the quantity of each timeslicing parameters corresponding with the live stream in the fringe node is more than pre-set deposit When storing up quantity, time earliest fragment data will be generated and deleted, so that corresponding with the live stream point in the fringe node The quantity of sheet data is no more than the storage quantity.
In method provided in an embodiment of the present invention, fringe node is carried out when reading live stream every time to the live stream While fragment obtains fragment data, the fragment corresponding with the live stream that can also currently be also easy to produce in real-time detection fringe node Data bulk.When the quantity of fragment data is more than storage quantity, the fragment data generated earliest is deleted.
It should be noted that live streaming segment deletion is the regular behavior of fringe node, can be cached by defaulting the fringe node by 2 Segment deletes segment earliest in caching after newly generating a segment.Because viewing is the same as live stream all the way, the edge Node can service multiple player clients simultaneously, and only new segment generates, and can just execute the movement of refreshing and deletion.
The specific implementation process and its deriving mode of above-mentioned each embodiment, it is within the scope of the present invention.
Corresponding with method described in Fig. 1, the embodiment of the invention also provides a kind of antitheft chain apparatus, for in Fig. 1 The specific implementation of method, antitheft chain apparatus provided in an embodiment of the present invention can be applied in fringe node, structural schematic diagram As shown in figure 4, specifically including:
First acquisition unit 401, for determining and the live streaming when receiving the live streaming fragment request of player transmission The corresponding segment to be broadcast live of fragment request, and obtain the live information for including in the live streaming fragment request and target live streaming ground Location;
First judging unit 402, for whether judging in the live information comprising corresponding with the live streaming fragment request Timeslicing parameters;
First determination unit 403, if for including fragment corresponding with the live streaming fragment request in the live information Parameter, it is determined that the player is not the live streaming corresponding with target live streaming address sent for the first time to the fringe node Fragment request, and obtain the target authentication code for including in target live streaming address, address aging time, target cipher key version number And live file name;
Authentication unit 404, for according to the timeslicing parameters, target authentication code, address aging time, target cipher key version Number and live file name, antitheft certification is carried out to target live streaming address;
Second acquisition unit 405, for obtaining the fragment when the antitheft certification by the target being broadcast live address Entrained fragment number in parameter;
Third acquiring unit 406, for obtaining the current slice data to match with the fragment number, the current slice Data are that the fringe node reads live stream in pre-set live streaming source station in real time, and according to being taken in the live stream The live stream, is carried out the fragment data obtained after fragment by the burst information of band, and the live stream is the segment to be broadcast live Corresponding live stream;
Second judgment unit 407 judges whether the current slice data are the live streaming for being based on the fragment number The last one fragment data of stream;
First trigger unit 408, if for the current slice data not being the last one fragment number of the live stream According to, then in the current slice data be embedded in target timeslicing parameters, and will carry target timeslicing parameters current slice data It is sent to the player, triggers player plays current live segment corresponding with the current slice data, and according to Live streaming fragment request corresponding with next live streaming segment, the target are sent to the fringe node according to the target timeslicing parameters Timeslicing parameters are the timeslicing parameters of next fragment data;
Second trigger unit 409, if being the last one fragment data of the live stream for the current slice data, The current slice data then are sent to the player, it is corresponding with the current slice data to trigger the player plays Current live segment, so that the player after completing to play the current live segment, terminates live play.
First acquisition unit 401, the first judging unit 402 in the above antitheft chain apparatus disclosed by the embodiments of the present invention, First determination unit 403, authentication unit 404, second acquisition unit 405, third acquiring unit 406, second judgment unit 407, The specific work process of first trigger unit 408 and the second trigger unit 409, reference can be made to preventing disclosed in the above embodiment of the present invention The corresponding content in chain method is stolen, is not discussed here.
The embodiment of the invention provides a kind of anti-stealing link method, this method, which can be applied, to play out live video Player in, executing subject is player, and the method flow diagram of the method is as shown in figure 5, specifically include:
S501: when receiving live play triggering command every time, obtaining the live information of current live streaming segment to be played, And determine segment to be broadcast live corresponding with the live information;
In embodiments of the present invention, when player is when receiving live play triggering command every time, acquisition is currently wait broadcast Straighten the determining segment to be broadcast live of live information for broadcasting segment.The live information includes live streaming room number, main broadcaster's title, live streaming type Deng.
It should be noted that the live play triggering command can be the live play triggering that user sends to the player Instruction, or carry the fragment data of timeslicing parameters.
S502: key request is sent to pre-set authentication management server, and receives the authentication management server According to the current key group of key request feedback, current key version number corresponding with the current key group is determined;
In embodiments of the present invention, it after receiving live play triggering command, can be taken to pre-set authentication management Business device sends key request.Player receives the authentication management server by the api interface between authentication management server The current key group being currently newly generated, and determine the current key version number in the current key group.
It should be noted that authentication management server can generate a group key group in real time, each key group carries one Key version number.The corresponding key version number of each key group is different.
S503: detecting the player whether there is live streaming address corresponding with the segment to be broadcast live;
In embodiments of the present invention, it after receiving live play triggering command and obtaining current key group, detects this and broadcasts It puts in device with the presence or absence of live streaming address corresponding with the segment to be broadcast live.
S504: when the player is not present with described when segment corresponding live streaming address is broadcast live, to pre-set Scheduler dispatches Address requests corresponding with the segment to be broadcast live;
In embodiments of the present invention, when there is no live streaming addresses corresponding with the segment to be broadcast live in player, then to tune It spends device and sends Address requests, so that address is broadcast live after receiving the Address requests, for the segment distribution to be broadcast live in the scheduler.
It should be noted that the current live address can be player is receiving live play triggering command every time Afterwards, the live streaming address that request scheduling device generates;It is also possible to player behind the live streaming address that first time request scheduling device generates, The live streaming address is stored, and obtains stored live streaming address when receiving live play triggering command every time.
S505: when receiving the current live address that the scheduler is fed back according to the Address requests, setting and institute State the current live address corresponding address aging time;
In embodiments of the present invention, when the current live address of scheduler generation and to player feedback, player is being connect When receiving current live address, address expired time is arranged according to the current live address.
It should be noted that the address aging time can be player and be autonomously generated, it can also be with authentication management server It generates.The address aging time is used for the timeliness for guaranteeing that address is broadcast live, and prevents illegal user from stealing the current live address Afterwards, the live content of live video provider is obtained using the current live address.
S506: parsing the current live address, obtains live file name corresponding with the live information;
In embodiments of the present invention, when getting the current live address that scheduler pre-generates, it is current straight to parse this Address is broadcast, to obtain the live file name in the current live address.
It should be noted that it can be the stream name of main broadcaster, only one unique stream of each main broadcaster that the live file is entitled Name.
S507: it according to the address aging time, current key group, live information and live file name, generates target and recognizes Code is demonstrate,proved, and the target authentication code, address aging time and current key version number are encapsulated into the current live address, It obtains target and address is broadcast live;
In embodiments of the present invention, raw according to address expired time, current key group, live information and live file name It is encapsulated in current live address at target authentication code, and by target authentication code, current key version number, obtains target live streaming ground Location.It include address aging time and the live file name in the current live address in target live streaming address, and carrying should Target authentication code and current key version number.
S508: the live streaming for carrying the target live streaming address and the live information is sent to pre-set fringe node Fragment request, trigger the fringe node according to the live information and the target live streaming address in target authentication code, Location expired time, live file name and current key version number carry out antitheft certification;
In embodiments of the present invention, which is broadcast live address and live information is encapsulated into live streaming fragment request, and to Pre-set fringe node sends the live streaming fragment request for carrying target live streaming address.Fringe node is triggered to be believed according to the live streaming Address aging time, target authentication code, live file name and current key version number in breath and target live streaming address are prevented Steal certification.
S509: when the current slice data corresponding with the live streaming fragment request for receiving the fringe node feedback When, determine that the fringe node passes through to the target authentication code, address aging time, live file name and current key version number Antitheft certification, and parse the current slice data, obtain current live segment corresponding with the current slice data;
In embodiments of the present invention, when fringe node is to target authentication code, address aging time, live file name and current When the antitheft certification of key version number passes through, fringe node can feed back corresponding with the live streaming fragment request current to the player Fragment data.At this point, parsing the fragment data when player receives current slice data, acquisition needs to play Current live segment.
S510: the current live segment is played out on the pre-set display page, and is currently broadcast described In the playing process of film releasing section, the current slice data are detected with the presence or absence of target timeslicing parameters, the target timeslicing parameters For the timeslicing parameters of next fragment data;
In embodiments of the present invention, the corresponding live streaming segment of the current fragment data is played into display circle in the player On face, and during the broadcasting segment plays out, detecting the current fragment data whether there is target timeslicing parameters, That is, the timeslicing parameters of next fragment data.
It should be noted that the fragment data is that fringe node is sent in the form of multiple piecemeal fields, one It include multiple piecemeal fields in fragment data, wherein point of next fragment data is carried in the piecemeal field of penultimate Piece parameter.
S511: if the current slice data include the target timeslicing parameters, it is determined that the current slice data are Live play triggering command, and the live information of next segment to be broadcast live is generated according to the target timeslicing parameters, execute institute Player is stated every time to the process of fringe node request live streaming segment to be played;
In embodiments of the present invention, if the current packet segment timeslicing parameters containing target, it is determined that the current slice number According to the live play triggering command to obtain next live streaming segment, after being characterized in current live segment, there are also next live streaming segments. The player can encapsulate the target timeslicing parameters into live information, according to the live information under fringe node request One live streaming segment, executes the process that live play segment is waited for each request.
It should be noted that if comprising timeslicing parameters and the timeslicing parameters are encapsulated to live information in current slice data Afterwards, it when player plays live streaming segment corresponding with the current fragment data closes to an end, executes and each requests to obtain with described Take the process of live streaming segment to be played, that is, execute as the process of above-mentioned steps S501~S510.
S512: if the current slice data do not include the target timeslicing parameters, the current live piece is completed When the broadcasting of section, terminate live play process.
In embodiments of the present invention, if not including target timeslicing parameters in current slice data, the current slice is proved The corresponding current live segment of data is the last one live streaming segment.After live streaming segment plays in this prior, terminate live streaming The process of broadcasting.
In anti-stealing link method provided in an embodiment of the present invention, when player receives live play triggering command, obtain Live information, and determine segment to be broadcast live.Key request is sent to authentication management server by pre-set api interface, To obtain the current key group and the corresponding current version number of current key group that authentication management server is currently generated.When broadcasting Put device acquire scheduler feedback current live address when, be arranged address expired time, and according to the address aging time, Current key group, live information and live file name generate target authentication code.By the target authentication code, the address aging time and Current key version number encapsulates to current live address, obtains target live streaming address and is sent to fringe node, so that edge Node carries out antitheft certification according to the live information, target authentication code, current version number, live file name, address aging time. After fringe node is by antitheft certification, fragment data is sent to player.Player is receiving working as fringe node transmission After preceding fragment data, which is parsed, broadcasting segment is obtained and plays out, and examined during broadcasting Survey whether the current fragment data includes target timeslicing parameters, if comprising showing that, there are also next segment to be broadcast live, determination is deserved Preceding fragment data is the live play triggering command of next live streaming segment, which is encapsulated into live information, The process of above-mentioned steps S501~S510 is executed according to the live information, is joined until not including target fragment in current slice data Number terminates live play process.
It should be noted that being encoded when fringe node sends fragment data to the player by http block transmission The mode of HTTP Chunked Encoding carries out sending each piecemeal field chunk corresponding with fragment data.By each point Block field chunk forms fragment data.When determining live streaming segment corresponding there is also next fragment data, by next fragment number According to target timeslicing parameters encapsulate into the extended field chunk_ext of target fragment field, read current point in player After the last chunk of sheet data, next live streaming segment is obtained according to the target timeslicing parameters.The target segment field is inverse Second fragment field.
Using method provided in an embodiment of the present invention, player is needing to send live streaming fragment request to fringe node every time Before, first the target authentication code being obtained ahead of time, address aging time, current key version number are encapsulated into and carry live file In the live streaming address of name.Since current key version number and address aging time have timeliness, obtained directly each When broadcasting segment, fringe node can be made to carry out effective antitheft certification, with prevent from obtaining there are illegal user by illegal means Address is broadcast live, resource is broadcast live in unauthorized theft, while reducing bandwidth cost, reduces live video provider economic loss.
In method provided in an embodiment of the present invention, based in above-mentioned steps S507, it is described according to the address aging time, Current key group, live information and live file name generate target authentication code, comprising:
It whether detects in the live information comprising timeslicing parameters corresponding with the segment to be broadcast live;
It is literary according to the live streaming when not including with described when segment corresponding timeslicing parameters are broadcast live in the live information Part name generates encryption method corresponding with the current key group;
The current key group and address aging time are encrypted using the encryption method, generate target authentication Code.
Further, when in the live information comprising timeslicing parameters corresponding with band live streaming segment, further includes:
When in the live information comprising when segment corresponding timeslicing parameters are broadcast live, obtaining the fragment ginseng with described Number, and parse the fragment number that the timeslicing parameters obtain fragment data to be obtained;
According to the live file name and the fragment number, the determining current encryption method with the current key group;
Using the current encryption method, the current key group and address aging time are encrypted, generate target Authentication code.
In anti-stealing link method provided in an embodiment of the present invention, which is detected, is determined in the live information It whether include timeslicing parameters.If not including, the live play triggering command being currently received is that user sends, should be wait be broadcast live Segment is then first live streaming segment.The encryption method of current key group is only determined according to live file name at this time;If including fragment Parameter then obtains the timeslicing parameters.According to the fragment number and live file name in the timeslicing parameters, adding for current key group is determined Decryption method.Using the encryption method, encryption is carried out to current key group and address aging time and generates target authentication code.Player By the target authentication code seal apparatus into live streaming address, so that fringe node recognizes the target after receiving the live streaming address Card code is verified, and is effectively prevented illegal user and is carried out robber's chain.
Optionally, the current slice data corresponding with the live streaming fragment request of the fringe node feedback are received Before, further includes:
The fringe node is received by returning to live streaming picture corresponding with the segment to be broadcast live after the antitheft certification Face group GOP data;
Parse the GOP data, play live streaming picture corresponding with the GOP data, and receive the fringe node according to The fragment data returned according to the live information.
In method provided in an embodiment of the present invention, if live streaming segment to be played is first live streaming segment, and the player will Carry target live streaming address live streaming fragment request be sent to fringe node carry out it is antitheft certification pass through after, receive the fringe node The GOP data corresponding with first live streaming segment of feedback.Wherein the GOP data are nearest one of fringe node real-time update Picture group data.Player plays out corresponding picture group according to the picture group data, and receives fringe node feedback Fragment data.
In the above-described embodiments, when not including timeslicing parameters in live information, determine that it is first straight for being somebody's turn to do segment to be broadcast live Segment is broadcast, which sends live streaming segment to fringe node, and the detailed process for playing live streaming segment may include walking as follows It is rapid:
1) when player receives the live play request of user's transmission, determine that live play request is live play Triggering command;Live information is obtained, and determines segment to be broadcast live;
2) key request is sent to authentication management server, to receive the current key group of authentication management server feedback, And determine the key version number of the current key group;
3) to scheduler dispatches Address requests, to receive the current live address of scheduler feedback, and address aging is set Time;
4) it parses the current live address and obtains live file name, and according to the live file name, determine the current key The encryption method of group, and key version number, live file name and address aging time are encrypted using the encryption method, it obtains Obtain target authentication code;
5) target authentication code, address aging time and current key version number are embedded in current live address by player, are obtained It obtains target and address is broadcast live;
6) player sends the live streaming fragment request for carrying target live streaming address to fringe node;
7) fringe node obtains the target live streaming address of the carrying in the live streaming fragment request, and parses target live streaming ground Location obtains address aging time, live file name, target authentication code and key version number;
8) fringe node sends the request time of live streaming fragment request according to player, judges whether the request time exceeds The address aging time;
If 9) without departing from according to the key version number, from the acquisition of authentication management server and current key version number pair The current key group answered;
10) fringe node determines the current encryption method of current key group according to the live file name, and current according to this Encryption method encrypts key version number, live file name and address aging time, obtains current authentication code;
11) current authentication code and target authentication code are matched;
If 12) matching is consistent, fringe node is the GOP data that player feeds back recent renewal, and is sending GOP data The fragment data for having been inserted into timeslicing parameters is sent afterwards, is entered step 14);
If 13) matching is inconsistent, fringe node terminates to service;
14) player parses the GOP data and obtains picture group, by picture after the GOP data for receiving fringe node transmission Face group plays out;
15) player receives the fragment data that fringe node is sent in broadcasting pictures group, and parsing fragment data obtains straight It broadcasts segment to play out, and detects whether the fragment data includes timeslicing parameters;
If 16) fragment data includes timeslicing parameters, the player is after completing to play the live streaming segment, according to this point Piece parameter requests fringe node to obtain live streaming segment again;
If 17) fragment data does not include timeslicing parameters, which terminates live streaming after playing the live streaming segment Playing process.
Using method provided in an embodiment of the present invention, player will encrypt the target authentication code obtained, current key version Number encapsulation into live streaming address, fringe node further according to the target authentication code that has encapsulated in live streaming address and key version number, Location expired time and live file name carry out antitheft certification, prevent illegal user from obtaining live content by way of stealing chain, protect Card reduces bandwidth cost, reduces live video provider economic loss.
In providing method of the embodiment of the present invention, it is based on above-mentioned steps S501, whether is the detection current slice data There are target timeslicing parameters, comprising:
The each piecemeal field for including in the fragment data is obtained, and in the playing process of the current live segment In, successively parse each piecemeal field;
When parsing to target segment field, detects whether to carry in the target segment field and join with the target fragment The corresponding fragment number of number, the target segment field are the penultimate piecemeal field in each piecemeal field;
If carrying fragment number corresponding with the target timeslicing parameters in the target segment field, it is determined that described current There are the target timeslicing parameters for fragment data;
If fragment number corresponding with the target timeslicing parameters is not carried in the target segment field, it is determined that described to work as The target timeslicing parameters are not present in preceding fragment data.
In method provided in an embodiment of the present invention, player obtains the fragment data after receiving current slice data In each piecemeal field chunk, and parse each chunk during playing current live segment, be resolved to inverse When second chunk, it is detected with the presence or absence of fragment number.Then determine if it exists current slice data there are target timeslicing parameters, Then current slice data do not store target timeslicing parameters to fragment number if it does not exist.
In embodiments of the present invention, if there are fragment numbers in chunk, it is determined that there is also next live streaming segments, play Device can be according to the corresponding timeslicing parameters of the fragment number, and segment is broadcast live in request again.And execution such as above-mentioned steps S501~ The process of S512 carries out robber's chain to prevent from occurring during obtaining and segment is broadcast live illegal user, and guarantee reduces bandwidth cost, drop Low live video provider economic loss.
In anti-stealing link method provided in an embodiment of the present invention, when in live information including timeslicing parameters, determining should be to straight Broadcasting segment is not first live streaming segment, which sends live streaming segment to fringe node, and plays the specific mistake of live streaming segment Journey may include steps of:
It 1), will be upper when player gets the timeslicing parameters for including in the corresponding upper fragment data of upper live streaming segment Live play triggering command of one fragment data as this request live streaming segment;
2) live information corresponding with the live play triggering command is obtained, and determines segment to be broadcast live, to authentication management Server sends key request, to receive the current key group of authentication management server feedback, and determines the current key group Key version number;
3) detect whether the player stores live streaming address corresponding with first live streaming segment, if not stored, to tune It spends device and sends Address requests, to receive the current live address of scheduler feedback, and address expired time is set;
4) it parses the current live address and obtains live file name, and obtain the timeslicing parameters in live information, according to this The fragment number of live file name and timeslicing parameters determines the encryption method of the current key group, and using the encryption method to close Key version number, fragment number, live file name and address aging time are encrypted, and target authentication code is obtained;
5) target authentication code, key version number and address aging time are embedded in current live address by player, obtain mesh Mark live streaming address;
6) player sends the live streaming fragment request for carrying target live streaming address and timeslicing parameters to fringe node;
7) fringe node obtains target live streaming address and the timeslicing parameters of the carrying in the live streaming fragment request, and parsing should Target is broadcast live address and obtains address aging time, live file name, key version number and address aging time;
8) fringe node sends the request time of live streaming fragment request according to player, judges whether the request time exceeds The address aging time;
If 9) without departing from according to the current key version number, from the acquisition of authentication management server and current key version Number corresponding current key group;
10) fragment number that fringe node should carry in the live file name and timeslicing parameters, determines current key group Current encryption method, and according to the current encryption method, to live file name, fragment number, key group version number and address aging Time is encrypted, and current authentication code is obtained;
11) current authentication code and target authentication code are matched, matches consistent execution step 12);Match inconsistent hold Row step 15);
12) according to the fragment number in timeslicing parameters, the fragment data to match with the fragment number is obtained, and detects the fragment Whether data are the last one fragment data;
13) if it is not, fragment data is sent to player again after next timeslicing parameters are then embedded in fragment data, into step It is rapid 16);
14) it if so, the fragment data is directly sent to player, enters step 16)
15) fringe node terminates to service;
16) player obtains live streaming segment and carries out in the fragment data for receiving fringe node transmission, parsing fragment data It plays, and detects whether the fragment data includes timeslicing parameters;
If 17) fragment data includes timeslicing parameters, which executes again after completing to play the live streaming segment Above-mentioned steps 1);
If 18) fragment data does not include timeslicing parameters, which terminates live streaming after playing the live streaming segment Playing process.
If it should be noted that address, or simulation real user request live streaming is broadcast live in illegal user in transmission process It is distorted during segment in this four field contents of live file name, fragment number, key group version number and address aging time Any one of, the inevitable authentication code generated with player of the authentication code that fringe node is calculated is inconsistent.
Corresponding with method described in Fig. 5, the embodiment of the invention also provides a kind of antitheft chain apparatus, for in Fig. 5 The specific implementation of method, antitheft chain apparatus provided in an embodiment of the present invention can using with play live content player in, Its structural schematic diagram is as shown in fig. 6, specifically include:
4th acquiring unit 601, for obtaining and the live play when receiving live play triggering command every time The corresponding live information of triggering command, and determine segment to be broadcast live corresponding with the live information;
First transmission unit 602, for sending key request to pre-set authentication management server, and described in reception The current key group that authentication management server is fed back according to the key request determines corresponding with the current key group current Key version number;
First detection unit 603 whether there is live streaming corresponding with the segment to be broadcast live for detecting the player Address;
Second transmission unit 604, for live streaming address corresponding with the segment to be broadcast live to be not present when the player When, to pre-set scheduler dispatches Address requests corresponding with the segment to be broadcast live;
Setting unit 605, for working as the current live address for receiving the scheduler and feeding back according to the Address requests When, the address aging time corresponding with the current live address is set;
First resolution unit 606 obtains live streaming corresponding with the live information for parsing the current live address Filename;
Generation unit 607 is used for according to the address aging time, current key group, live information and live file name, Target authentication code is generated, and the target authentication code, address aging time and current key version number are encapsulated to described current It is broadcast live in address, obtains target and address is broadcast live;
Third transmission unit 608 carries the target live streaming address and institute for sending to pre-set fringe node The live streaming fragment request for stating live information triggers the fringe node according to the live information and target live streaming address In target authentication code, address aging time, live file name and current key version number carry out antitheft certification;
Second resolution unit 609, for corresponding with the live streaming fragment request when receiving the fringe node feedback When current slice data, determine the fringe node by the target authentication code, address aging time, live file name and working as The antitheft certification of preceding key version number, and the current slice data are parsed, obtain work as corresponding with the current slice data Preceding live streaming segment;
Second detection unit 610, for the current live segment to be played out on the pre-set display page, And in the playing process of the currently playing segment, the current slice data are detected with the presence or absence of target timeslicing parameters, institute State the timeslicing parameters that target timeslicing parameters are next fragment data;
Execution unit 611, if including the target timeslicing parameters for the current slice data, it is determined that described current Fragment data is live play triggering command, and the live streaming letter of next segment to be broadcast live is generated according to the target timeslicing parameters Breath executes the player every time to the process of fringe node request live streaming segment to be played;
End unit 612, if not including the target timeslicing parameters for the current slice data, described in completion When the broadcasting of current live segment, terminate live play process.
The 4th acquiring unit 601, the first transmission unit 602 in the above antitheft chain apparatus disclosed by the embodiments of the present invention, First detection unit 603, the second transmission unit 604, setting unit 605, the first resolution unit 606, generation unit 607, second Transmission unit 608, the second resolution unit 609, second detection unit 610, the specific work of execution unit 611 and end unit 612 Make process, reference can be made to the corresponding content in the disclosed anti-stealing link method applied to player of the above embodiment of the present invention, here No longer repeated.
The present invention also provides a kind of anti-stealing link system, system module figure is as shown in fig. 7, specifically include:
Fringe node 701, player 702, live streaming source station 703, scheduler 704 and authentication management server 705;
The fringe node 701, the live stream sent for receiving the live streaming source station, and according in the live stream Burst information, by the live streaming flow fragmentation at multiple fragment datas;When the player sends live streaming fragment request, execute such as The method of above-mentioned steps S101~S109;
The player 702, for every time receive live play triggering command when, execute as above-mentioned steps S501~ The method of S512;
The live streaming source station 703, for for the burst information corresponding with every live stream all the way of the insertion per live stream all the way, and The live stream for being inserted into burst information is sent to the fringe node;
The scheduler 704, for being described broadcast according to the Address requests when receiving the Address requests of player Put device feedback live streaming address;
The authentication management server 705, for generating new key group in real time, by pre-set api interface with The fringe node and player connection, so that the fringe node and the player are obtained by the api interface Key group.
The embodiment of the present invention is provided in anti-stealing link system, obtains live streaming address and authentication pipe according to from scheduler by player After managing server acquisition current key group, according to the address aging time in the live streaming address, live file name, current key group Corresponding current key version number generates target authentication code, and target authentication code, address aging time are encapsulated into live streaming address, So that fringe node carries out antitheft certification in the live streaming fragment request for receiving player.Wherein, when fringe node is receiving When the live streaming fragment request sent to player, live stream is obtained from live streaming source station, it is right and according to the burst information in live stream The live stream carries out fragment processing, obtains each fragment data.Since live streaming is real-time perfoming, the fringe node side Live stream, the processing of Bian Jinhang fragment are obtained, while also sending fragment data to player, until the last one fragment data knot Beam.
Using the system of the invention that example provides in real time, burst information, fringe node are inserted into live stream by source station is broadcast live Fragment processing is then carried out according to the burst information.Player carries out a series of encryption, and fringe node carries out antitheft recognizing again Card, guarantee when obtaining live streaming segment, effectively discern whether to pass through there are illegal user and steal chain acquisition live content, in turn every time Play the role of door chain.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system or For system embodiment, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to method The part of embodiment illustrates.System and system embodiment described above is only schematical, wherein the conduct The unit of separate part description may or may not be physically separated, component shown as a unit can be or Person may not be physical unit, it can and it is in one place, or may be distributed over multiple network units.It can root According to actual need that some or all of the modules therein is selected to achieve the purpose of the solution of this embodiment.Ordinary skill Personnel can understand and implement without creative efforts.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, it can be realized with electronic hardware, computer software, or a combination of the two.
In order to clearly illustrate the interchangeability of hardware and software, it is generally retouched according to function in the above description Each exemplary composition and step are stated.These functions are implemented in hardware or software actually, depending on technical solution Specific application and design constraint.Professional technician can to each specific application come using distinct methods to realize The function of description, but such implementation should not be considered as beyond the scope of the present invention.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (13)

1. a kind of anti-stealing link method, which is characterized in that the method is applied to fringe node, which comprises
When receiving the live streaming fragment request of player transmission, piece to be broadcast live corresponding with the live streaming fragment request is determined Section, and obtain the live information for including in the live streaming fragment request and target live streaming address;
Whether judge in the live information comprising timeslicing parameters corresponding with the live streaming fragment request;
If in the live information including timeslicing parameters corresponding with the live streaming fragment request, it is determined that the player is not The live streaming fragment request corresponding with target live streaming address sent for the first time to the fringe node, and it is straight to obtain the target Broadcast the target authentication code for including in address, address aging time, target cipher key version number and live file name;
According to the timeslicing parameters, target authentication code, address aging time, target cipher key version number and live file name, to institute It states target live streaming address and carries out antitheft certification;
When the antitheft certification by the target being broadcast live address, fragment number entrained in the timeslicing parameters is obtained;
The current slice data to match with the fragment number are obtained, the current slice data are that the fringe node is read in real time The live stream in pre-set live streaming source station is taken, and according to burst information entrained in the live stream, by the live streaming Stream carries out the fragment data obtained after fragment, and the live stream is the corresponding live stream of the segment to be broadcast live;
Based on the fragment number, judge the current slice data whether be the live stream the last one fragment data;
If the current slice data are not the last one fragment data of the live stream, in the current slice data Target timeslicing parameters are embedded in, and the current slice data for carrying target timeslicing parameters are sent to the player, described in triggering Player plays current live segment corresponding with the current slice data, and according to the target timeslicing parameters to the side Edge node sends live streaming fragment request corresponding with next live streaming segment, and the target timeslicing parameters are point of next fragment data Piece parameter;
If the current slice data are the last one fragment data of the live stream, work as to described in player transmission Preceding fragment data triggers player plays current live segment corresponding with the current slice data, so that described broadcast Device is put after completing to play the current live segment, terminates live play.
2. the method according to claim 1, wherein described according to the timeslicing parameters, target authentication code, address Expired time, target cipher key version number and live file name carry out antitheft certification to target live streaming address, comprising:
It determines request time corresponding with the live streaming fragment request, and judges whether the request time exceeds the address mistake Time phase;
If the request time without departing from the address aging time, is sent to pre-set authentication management server and institute State the corresponding secret key request message of target cipher key version number;
It is being fed back according to the secret key request message with the target cipher key version number when receiving the authentication management server When corresponding target cipher key group, according to the fragment number in the live file name and the timeslicing parameters, the determining and target The corresponding target encryption method of key group;
Using the target encryption method, to the target cipher key version number, fragment number, live file name and address aging time It is encrypted, generates current authentication code;
The target authentication code is matched with the current authentication code, judges the target authentication code and the current authentication Whether code is consistent;
If the target authentication code is consistent with the current authentication code, by the antitheft certification for the target being broadcast live address.
3. the method according to claim 1, wherein further include:
If not including timeslicing parameters corresponding with the live streaming fragment request in the live information, it is determined that the player is first Secondary live streaming fragment request corresponding with target live streaming address being sent to the fringe node;
Parse target live streaming address, obtain the target authentication code for including in target live streaming address, the address aging time, Target cipher key version number and live file name;
According to the target authentication code, address aging time, target cipher key version number and live file name, the target is broadcast live Address carries out antitheft certification;
When by the target be broadcast live address antitheft certification when, read in real time in pre-set live streaming source station with it is described to The corresponding live stream of segment, and live streaming picture group GOP data corresponding with the live stream is broadcast live;
The GOP data are sent to the player, trigger the player according to the GOP data playback and the live streaming Flow corresponding live streaming picture;
The burst information for including in the live stream is obtained, and the live stream is carried out at fragment according to the burst information Reason, obtains multiple fragment datas;
By each fragment data according to playing sequence corresponding with the live stream carry out label, and by label and take First fragment data with next timeslicing parameters is sent to the player, triggers the player to first fragment Data are parsed, and are obtained current live segment and are broadcast live broadcasting, and described in requesting again according to next timeslicing parameters Fringe node obtains next fragment data.
4. method according to claim 1 or 3, which is characterized in that further include:
The quantity of generated each fragment data corresponding with the live stream in fringe node described in real-time detection;
When the quantity of each timeslicing parameters corresponding with the live stream in the fringe node is more than pre-set storage number When amount, time earliest fragment data will be generated and deleted, so that fragment number corresponding with the live stream in the fringe node According to quantity be no more than the storage quantity.
5. the method according to claim 1, wherein further include:
When the antitheft certification not by the target being broadcast live address, interrupts and sent and the fragment number pair to the player The fragment data answered.
6. a kind of antitheft chain apparatus characterized by comprising
First acquisition unit, for when receiving the live streaming fragment request of player transmission, determination to be asked with the live streaming segment Corresponding segment to be broadcast live is sought, and obtains the live information for including in the live streaming fragment request and target live streaming address;
First judging unit, for whether judging in the live information comprising fragment corresponding with live streaming fragment request ginseng Number;
First determination unit, if for including timeslicing parameters corresponding with the live streaming fragment request in the live information, Determine that the player is not that the live streaming segment corresponding with target live streaming address sent for the first time to the fringe node is asked It asks, and obtains target authentication code, address aging time, target cipher key version number and the live streaming for including in target live streaming address Filename;
Authentication unit, for according to the timeslicing parameters, target authentication code, address aging time, target cipher key version number and straight Filename is broadcast, antitheft certification is carried out to target live streaming address;
Second acquisition unit, for obtaining in the timeslicing parameters when the antitheft certification by the target being broadcast live address Entrained fragment number;
Third acquiring unit, for obtaining the current slice data to match with the fragment number, the current slice data are The fringe node reads the live stream in pre-set live streaming source station in real time, and according to point entrained in the live stream The live stream, is carried out the fragment data obtained after fragment by piece information, and the live stream is that the segment to be broadcast live is corresponding Live stream;
Second judgment unit, for be based on the fragment number, judge the current slice data whether be the live stream most The latter fragment data;
First trigger unit, if for the current slice data not being the last one fragment data of the live stream, It is embedded in target timeslicing parameters in the current slice data, and the current slice data for carrying target timeslicing parameters are sent to institute Player is stated, triggers player plays current live segment corresponding with the current slice data, and according to the mesh It marks timeslicing parameters and sends live streaming fragment request corresponding with next live streaming segment, the target timeslicing parameters to the fringe node For the timeslicing parameters of next fragment data;
Second trigger unit, if being the last one fragment data of the live stream for the current slice data, to institute It states player and sends the current slice data, it is corresponding with the current slice data current straight to trigger the player plays Segment is broadcast, so that the player after completing to play the current live segment, terminates live play.
7. a kind of anti-stealing link method, which is characterized in that the method is applied to player, which comprises
When receiving live play triggering command every time, live information corresponding with the live play triggering command is obtained, And determine segment to be broadcast live corresponding with the live information;
Key request is sent to pre-set authentication management server, and receives the authentication management server according to described close The current key group of key request feedback, determines current key version number corresponding with the current key group;
Detecting the player whether there is live streaming address corresponding with the segment to be broadcast live;
When the player is not present with described when segment corresponding live streaming address is broadcast live, to pre-set scheduler dispatches Address requests corresponding with the segment to be broadcast live;
When receiving the current live address that the scheduler is fed back according to the Address requests, setting and the current live The address corresponding address aging time;
The current live address is parsed, live file name corresponding with the live information is obtained;
According to the address aging time, current key group, live information and live file name, target authentication code is generated, and will The target authentication code, address aging time and current key version number encapsulate into the current live address, obtain target Address is broadcast live;
The live streaming fragment request for carrying the target live streaming address and the live information is sent to pre-set fringe node, When triggering target authentication code, the address aging that the fringe node is broadcast live in address according to the live information and the target Between, live file name and current key version number carry out antitheft certification;
When receiving the current slice data corresponding with the live streaming fragment request of the fringe node feedback, the side is determined Edge node by the target authentication code, address aging time, live file name and the antitheft certification of current key version number, And the current slice data are parsed, obtain current live segment corresponding with the current slice data;
The current live segment is played out on the pre-set display page, and broadcasting in the currently playing segment During putting, the current slice data are detected with the presence or absence of target timeslicing parameters, the target timeslicing parameters are next fragment The timeslicing parameters of data;
If the current slice data include the target timeslicing parameters, it is determined that the current slice data are live play touching Send instructions, and generate the live information of next segment to be broadcast live according to the target timeslicing parameters, it is every to execute the player The secondary process to fringe node request live streaming segment to be played;
If the current slice data do not include the target timeslicing parameters, in the broadcasting for completing the current live segment When, terminate live play process.
8. the method according to the description of claim 7 is characterized in that it is described according to the address aging time, current key group, Live information and live file name generate target authentication code, comprising:
It whether detects in the live information comprising timeslicing parameters corresponding with the segment to be broadcast live;
When not including in the live information with described when segment corresponding timeslicing parameters are broadcast live, according to the live file name Generate encryption method corresponding with the current key group;
The live file name, key group version number and address aging time are encrypted using the encryption method, generated Target authentication code.
9. according to the method described in claim 8, it is characterized in that, receiving fringe node feedback with the live streaming piece Before section requests corresponding current slice data, further includes:
The fringe node is received by returning to live streaming picture group corresponding with the segment to be broadcast live after the antitheft certification GOP data;
The GOP data are parsed, live streaming picture corresponding with the GOP data is played, and receive the fringe node according to institute State the fragment data of live information return.
10. according to the method described in claim 8, it is characterized by further comprising:
When in the live information comprising obtaining the timeslicing parameters when segment corresponding timeslicing parameters are broadcast live with described, and Parse the fragment number that the timeslicing parameters obtain fragment data to be obtained;
According to the live file name and the fragment number, the determining current encryption method with the current key group;
Using the current encryption method, to the live file name, key group version number, fragment number and address aging time into Row encryption, generates target authentication code.
11. the method according to the description of claim 7 is characterized in that the detection current slice data whether there is mesh Mark timeslicing parameters, comprising:
The each piecemeal field for including in the fragment data is obtained, and in the playing process of the current live segment, according to The secondary each piecemeal field of parsing;
When parsing to target segment field, detects and whether carried in the target segment field and the target timeslicing parameters pair The fragment number answered, the target segment field are the penultimate piecemeal field in each piecemeal field;
If carrying fragment number corresponding with the target timeslicing parameters in the target segment field, it is determined that the current slice There are the target timeslicing parameters for data;
If fragment number corresponding with the target timeslicing parameters is not carried in the target segment field, it is determined that described current point The target timeslicing parameters are not present in sheet data.
12. a kind of antitheft chain apparatus characterized by comprising
4th acquiring unit refers to for obtaining when receiving live play triggering command every time with live play triggering Corresponding live information is enabled, and determines segment to be broadcast live corresponding with the live information;
First transmission unit for sending key request to pre-set authentication management server, and receives the authentication pipe The current key group that reason server is fed back according to the key request, determines current key version corresponding with the current key group This number;
First detection unit whether there is live streaming address corresponding with the segment to be broadcast live for detecting the player;
Second transmission unit, for being not present with described when segment corresponding live streaming address is broadcast live when the player, to pre- The scheduler dispatches being first arranged Address requests corresponding with the segment to be broadcast live;
Setting unit, for being arranged when receiving the current live address that the scheduler is fed back according to the Address requests The address aging time corresponding with the current live address;
First resolution unit obtains live file name corresponding with the live information for parsing the current live address;
Generation unit, for generating mesh according to the address aging time, current key group, live information and live file name Authentication code is marked, and the target authentication code, address aging time and current key version number are encapsulated to the current live In location, obtains target and address is broadcast live;
Third transmission unit carries the target live streaming address and live streaming letter for sending to pre-set fringe node The live streaming fragment request of breath triggers the fringe node according to the target in the live information and target live streaming address Authentication code, address aging time, live file name and current key version number carry out antitheft certification;
Second resolution unit receives fringe node feedback current slice corresponding with the live streaming fragment request for working as When data, determine that the fringe node passes through to the target authentication code, address aging time, live file name and current key version This number antitheft certification, and the current slice data are parsed, obtain current live piece corresponding with the current slice data Section;
Second detection unit, for playing out the current live segment on the pre-set display page, and in institute In the playing process for stating currently playing segment, the current slice data are detected with the presence or absence of target timeslicing parameters, the target Timeslicing parameters are the timeslicing parameters of next fragment data;
Execution unit, if including the target timeslicing parameters for the current slice data, it is determined that the current slice number According to for live play triggering command, and the live information of next segment to be broadcast live is generated according to the target timeslicing parameters, held The row player is every time to the process of fringe node request live streaming segment to be played;
End unit is described current straight in completion if not including the target timeslicing parameters for the current slice data When broadcasting the broadcasting of segment, terminate live play process.
13. a kind of anti-stealing link system characterized by comprising
Fringe node, player, live streaming source station, scheduler and authentication management server;
The fringe node, the live stream sent for receiving the live streaming source station, and according to the fragment letter in the live stream Breath, by the live streaming flow fragmentation at multiple fragment datas;When the player sends live streaming fragment request, such as above-mentioned power is executed Benefit require 1~5 described in method;
The player, for executing as described in the claims 7~11 when receiving live play triggering command every time Method;
The live streaming source station for being every insertion of live stream all the way and the corresponding burst information per live stream all the way, and will insert The live stream for entering burst information is sent to the fringe node;
The scheduler, for being that the player is anti-according to the Address requests when receiving the Address requests of player Feedback live streaming address;
The authentication management server passes through pre-set api interface and the edge for generating new key group in real time Node and player connection, so that the fringe node and the player obtain key group by the api interface.
CN201910823357.2A 2019-09-02 2019-09-02 Anti-stealing-link method, device and system Active CN110381334B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910823357.2A CN110381334B (en) 2019-09-02 2019-09-02 Anti-stealing-link method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910823357.2A CN110381334B (en) 2019-09-02 2019-09-02 Anti-stealing-link method, device and system

Publications (2)

Publication Number Publication Date
CN110381334A true CN110381334A (en) 2019-10-25
CN110381334B CN110381334B (en) 2021-05-28

Family

ID=68261448

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910823357.2A Active CN110381334B (en) 2019-09-02 2019-09-02 Anti-stealing-link method, device and system

Country Status (1)

Country Link
CN (1) CN110381334B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111787342A (en) * 2020-06-22 2020-10-16 亦非云互联网技术(上海)有限公司 Streaming media live broadcast viewing method, system, medium and device
CN112689164A (en) * 2020-12-17 2021-04-20 杭州当虹科技股份有限公司 CDN-based video anti-theft chain system
CN112953724A (en) * 2021-02-22 2021-06-11 广州虎牙科技有限公司 Authentication method of anti-theft chain, and related device and equipment
CN114679601A (en) * 2022-03-29 2022-06-28 湖南快乐阳光互动娱乐传媒有限公司 Signal plug flow method and device
CN115459989A (en) * 2022-09-02 2022-12-09 京东科技信息技术有限公司 Data access method and device

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007076685A1 (en) * 2005-12-31 2007-07-12 Zte Corporation A method for extending the url applicable to the streaming media system
US20100180082A1 (en) * 2009-01-12 2010-07-15 Viasat, Inc. Methods and systems for implementing url masking
TW201322044A (en) * 2011-11-28 2013-06-01 Prospect Telecomm Technology Co Ltd Anti-theft linking system and archives download method thereof
US20140229544A1 (en) * 2013-02-12 2014-08-14 BackPeddle, LLC Sharing content in social networks
CN104284213A (en) * 2014-09-26 2015-01-14 深圳市同洲电子股份有限公司 Hotlink protection method, client side and system
CN104320377A (en) * 2014-09-25 2015-01-28 华为技术有限公司 An anti-stealing-link method and device for stream media file
CN104811773A (en) * 2015-04-28 2015-07-29 天脉聚源(北京)传媒科技有限公司 Hotlinking prevention-based channel playing implementation method, system and equipment
CN104853243A (en) * 2015-05-13 2015-08-19 上海玮舟微电子科技有限公司 Transport stream de-multiplexing method and apparatus
CN106936770A (en) * 2015-12-30 2017-07-07 玲珑视界科技(北京)有限公司 A kind of HLS index lists encrypted antitheft catenary system and method
CN107222480A (en) * 2017-05-27 2017-09-29 中国联合网络通信集团有限公司 A kind of flow media playing method, terminal device and CDN server
CN107707504A (en) * 2016-08-08 2018-02-16 中国电信股份有限公司 A kind of player method of Streaming Media, system and server and client side
CN108924595A (en) * 2018-08-15 2018-11-30 广东南方新媒体股份有限公司 Realize the method and system of TS slice door chain
CN109743586A (en) * 2018-12-28 2019-05-10 广州华多网络科技有限公司 Live streaming media anti-stealing link method and system
CN109996095A (en) * 2019-03-28 2019-07-09 湖南快乐阳光互动娱乐传媒有限公司 Method, system and medium for preventing stealing link playing in network video on demand

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007076685A1 (en) * 2005-12-31 2007-07-12 Zte Corporation A method for extending the url applicable to the streaming media system
US20100180082A1 (en) * 2009-01-12 2010-07-15 Viasat, Inc. Methods and systems for implementing url masking
TW201322044A (en) * 2011-11-28 2013-06-01 Prospect Telecomm Technology Co Ltd Anti-theft linking system and archives download method thereof
US20140229544A1 (en) * 2013-02-12 2014-08-14 BackPeddle, LLC Sharing content in social networks
CN104320377A (en) * 2014-09-25 2015-01-28 华为技术有限公司 An anti-stealing-link method and device for stream media file
CN104284213A (en) * 2014-09-26 2015-01-14 深圳市同洲电子股份有限公司 Hotlink protection method, client side and system
CN104811773A (en) * 2015-04-28 2015-07-29 天脉聚源(北京)传媒科技有限公司 Hotlinking prevention-based channel playing implementation method, system and equipment
CN104853243A (en) * 2015-05-13 2015-08-19 上海玮舟微电子科技有限公司 Transport stream de-multiplexing method and apparatus
CN106936770A (en) * 2015-12-30 2017-07-07 玲珑视界科技(北京)有限公司 A kind of HLS index lists encrypted antitheft catenary system and method
CN107707504A (en) * 2016-08-08 2018-02-16 中国电信股份有限公司 A kind of player method of Streaming Media, system and server and client side
CN107222480A (en) * 2017-05-27 2017-09-29 中国联合网络通信集团有限公司 A kind of flow media playing method, terminal device and CDN server
CN108924595A (en) * 2018-08-15 2018-11-30 广东南方新媒体股份有限公司 Realize the method and system of TS slice door chain
CN109743586A (en) * 2018-12-28 2019-05-10 广州华多网络科技有限公司 Live streaming media anti-stealing link method and system
CN109996095A (en) * 2019-03-28 2019-07-09 湖南快乐阳光互动娱乐传媒有限公司 Method, system and medium for preventing stealing link playing in network video on demand

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李吉广等: ""IPTV视频硬件加密传输***的设计"", 《电视技术》 *
高志恒等: ""互联网电视直播软件原理分析"", 《第2 2 届中国数字广播电视与网络发展年会暨第1 3 届全国互联网与音视频广播发展研讨会》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111787342A (en) * 2020-06-22 2020-10-16 亦非云互联网技术(上海)有限公司 Streaming media live broadcast viewing method, system, medium and device
CN112689164A (en) * 2020-12-17 2021-04-20 杭州当虹科技股份有限公司 CDN-based video anti-theft chain system
CN112689164B (en) * 2020-12-17 2022-06-28 杭州当虹科技股份有限公司 CDN-based video anti-theft chain system
CN112953724A (en) * 2021-02-22 2021-06-11 广州虎牙科技有限公司 Authentication method of anti-theft chain, and related device and equipment
CN114679601A (en) * 2022-03-29 2022-06-28 湖南快乐阳光互动娱乐传媒有限公司 Signal plug flow method and device
CN115459989A (en) * 2022-09-02 2022-12-09 京东科技信息技术有限公司 Data access method and device

Also Published As

Publication number Publication date
CN110381334B (en) 2021-05-28

Similar Documents

Publication Publication Date Title
CN110381334A (en) Anti-stealing-link method, device and system
CN103620609B (en) DRM(digital rights management is utilized for playing) method of digital content of scheme protection and corresponding system
CN103649962B (en) System and method for protecting digital contents with digital rights management (DRM)
EP3055805B1 (en) System and method for signaling and verifying url signatures for both url authentication and url-based content access authorization in adaptive streaming
WO2018177110A1 (en) Media content licensing method and device
US9648027B2 (en) Segment authentication for dynamic adaptive streaming
US7698554B2 (en) Controlling transmission of broadcast content
US6571344B1 (en) Method and apparatus for authenticating time-sensitive interactive communications
US9032497B2 (en) System and method for securing embedded media
US9185094B2 (en) Systems, methods and apparatuses for the secure transmission and restricted use of media content
CN101075866B (en) Method and system for loading message on Internet
CN105409226A (en) System and method for effectively controlling client behavior in adaptive streaming
CN104811773A (en) Hotlinking prevention-based channel playing implementation method, system and equipment
EP2974287A2 (en) Advertising download verification
KR101407373B1 (en) Method of implementing a state tracking mechanism in a communications session between a server and a client system
US8495154B2 (en) Content usage tracking in superdistribution
CN109905731A (en) Video file downloading anti-stealing link method, system and medium capable of preventing pass from being stolen
CN111932317A (en) Block chain based advertisement playing method, device, medium and electronic equipment
KR20080029596A (en) System for broadcasting in personal ip broadcasting system by applying personal drm and method using the same
US20050076183A1 (en) Method and apparatus for enforcing timed agreements
CN115514991B (en) IPTV video tamper-proof method, server and client
CN105847885B (en) A kind of white list generation system and method based on video render state
Lee et al. A DRM framework for secure distribution of mobile contents
CN101166293A (en) Method for opening mobile union to exchange multimedia information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant