CN110381334A - Anti-stealing-link method, device and system - Google Patents
Anti-stealing-link method, device and system Download PDFInfo
- Publication number
- CN110381334A CN110381334A CN201910823357.2A CN201910823357A CN110381334A CN 110381334 A CN110381334 A CN 110381334A CN 201910823357 A CN201910823357 A CN 201910823357A CN 110381334 A CN110381334 A CN 110381334A
- Authority
- CN
- China
- Prior art keywords
- live
- target
- address
- fragment
- current
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 178
- 239000012634 fragment Substances 0.000 claims abstract description 427
- 230000032683 aging Effects 0.000 claims description 124
- 230000005540 biological transmission Effects 0.000 claims description 31
- 241001269238 Data Species 0.000 claims description 13
- 238000001514 detection method Methods 0.000 claims description 11
- 238000003780 insertion Methods 0.000 claims description 5
- 230000037431 insertion Effects 0.000 claims description 5
- 238000003860 storage Methods 0.000 claims description 5
- 241000208340 Araliaceae Species 0.000 claims description 4
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 claims description 4
- 235000003140 Panax quinquefolius Nutrition 0.000 claims description 4
- 235000008434 ginseng Nutrition 0.000 claims description 4
- 238000011897 real-time detection Methods 0.000 claims description 4
- 238000013467 fragmentation Methods 0.000 claims description 3
- 238000006062 fragmentation reaction Methods 0.000 claims description 3
- 238000007726 management method Methods 0.000 description 40
- 238000010586 diagram Methods 0.000 description 8
- 238000012545 processing Methods 0.000 description 5
- 230000001960 triggered effect Effects 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 238000004422 calculation algorithm Methods 0.000 description 3
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000018109 developmental process Effects 0.000 description 2
- 101100234002 Drosophila melanogaster Shal gene Proteins 0.000 description 1
- 244000166071 Shorea robusta Species 0.000 description 1
- 235000015076 Shorea robusta Nutrition 0.000 description 1
- 238000013459 approach Methods 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000005538 encapsulation Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000005304 joining Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000010899 nucleation Methods 0.000 description 1
- 238000002360 preparation method Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000004088 simulation Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/21—Server components or server architectures
- H04N21/218—Source of audio or video content, e.g. local disk arrays
- H04N21/2187—Live feed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/254—Management at additional data server, e.g. shopping server, rights management server
- H04N21/2541—Rights Management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/258—Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
- H04N21/25808—Management of client data
- H04N21/25816—Management of client data involving client authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26606—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/43—Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
- H04N21/441—Acquiring end-user identification, e.g. using personal code sent by the remote control or by inserting a card
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4623—Processing of entitlement messages, e.g. ECM [Entitlement Control Message] or EMM [Entitlement Management Message]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/45—Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
- H04N21/462—Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
- H04N21/4627—Rights management associated to the content
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/835—Generation of protective data, e.g. certificates
- H04N21/8352—Generation of protective data, e.g. certificates involving content or source identification data, e.g. Unique Material Identifier [UMID]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/83—Generation or processing of protective or descriptive data associated with content; Content structuring
- H04N21/845—Structuring of content, e.g. decomposing content into time segments
- H04N21/8456—Structuring of content, e.g. decomposing content into time segments by decomposing the content in the time domain, e.g. in time segments
Landscapes
- Engineering & Computer Science (AREA)
- Multimedia (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Graphics (AREA)
- Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)
Abstract
The invention relates to the technical field of internet live broadcast, in particular to a method, a device and a system for preventing a hotlink from being stolen. According to the method, before a player sends a live broadcast segment request to an edge node each time, a target authentication code is generated according to address expiration time, a current key group, live broadcast information and a live broadcast file name, the target authentication code, the address expiration time and a target key version number are packaged into a target live broadcast address and sent to the edge node, and after the edge node receives the live broadcast segment request which is sent by the player and carries the target live broadcast address, the target authentication code, the address expiration time and the target key version number in the target live broadcast address are subjected to anti-theft authentication. Due to the fact that the target authentication code, the address expiration time and the target key version number have timeliness, anti-theft authentication is conducted every time when a live broadcast fragment is obtained, an illegal user is prevented from obtaining live broadcast content in a link stealing mode, bandwidth cost is reduced, and economic loss of a live broadcast video provider is reduced.
Description
Technical field
The present invention relates to internet direct seeding technique fields, more particularly to a kind of anti-stealing link method, apparatus and system.
Background technique
With the fast development of Internet technology and multimedia technology, there are more and more network direct broadcasting platforms,
Network direct broadcasting platform provides various network direct broadcasting services, for example, game live streaming, amusement live streaming or match live streaming etc..
User can according to the live stream uniform resource locator (Uniform Resource Locator, URL) of network direct broadcasting platform
It is flat to obtain network direct broadcasting from the fringe node of content distributing network (Content Delivery Network, CDN) system for location
Live stream in platform, and user is flowed to according to live streaming by the player of network direct broadcasting platform and plays live video.
However, with the quick development of Internet technology, the live video provider of network direct broadcasting platform has to face
Face a challenge, i.e. robber's chain.It steals chain and refers to that illegal user by certain technological means, cracks the live stream of network direct broadcasting platform
Then the address URL is obtained using the address live stream URL stolen from the fringe node of CDN system by third-party player
After live video, i.e. illegal user steal the address live stream URL provided by live video provider, provided around live video
The player of side, using the player of itself after the fringe node acquisition live video of the CDN system of live video provider,
With the behavior of the player plays live video of itself.Therefore, robber's chain behavior of illegal user increases network direct broadcasting platform
Bandwidth cost and server resource bring serious economic loss to live video provider.
Summary of the invention
Technical problem to be solved by the invention is to provide a kind of anti-stealing link methods, in this way, by live stream to divide
The form of sheet data is sent, and when each player obtains fragment data, will be carried out antitheft certification to live streaming address, be prevented
Only illegal user obtains live content by stealing chain, reduces bandwidth cost, reduces the economic loss of live video provider.
The present invention also provides a kind of antitheft chain apparatus, to guarantee the realization and application of the above method in practice.
A kind of anti-stealing link method, the method are applied to fringe node, which comprises
When receiving the live streaming fragment request of player transmission, determination is corresponding wait be broadcast live with the live streaming fragment request
Segment, and obtain the live information for including in the live streaming fragment request and target live streaming address;
Whether judge in the live information comprising timeslicing parameters corresponding with the live streaming fragment request;
If in the live information including timeslicing parameters corresponding with the live streaming fragment request, it is determined that the player
The live streaming fragment request corresponding with target live streaming address not sent for the first time to the fringe node, and obtain the mesh
Target authentication code, address aging time, target cipher key version number and the live file name for including in mark live streaming address;
According to the timeslicing parameters, target authentication code, address aging time, target cipher key version number and live file name,
Antitheft certification is carried out to target live streaming address;
When the antitheft certification by the target being broadcast live address, segment entrained in the timeslicing parameters is obtained
Number;
The current slice data to match with the fragment number are obtained, the current slice data are that the fringe node is real
When read live stream in pre-set live streaming source station, will be described and according to burst information entrained in the live stream
Live stream carries out the fragment data obtained after fragment, and the live stream is the corresponding live stream of the segment to be broadcast live;
Based on the fragment number, judge the current slice data whether be the live stream the last one fragment number
According to;
If the current slice data are not the last one fragment data of the live stream, in the current slice number
It is sent to the player according to middle insertion target timeslicing parameters, and by the current slice data for carrying target timeslicing parameters, is triggered
Player plays current live segment corresponding with the current slice data, and according to the target timeslicing parameters to institute
It states fringe node and sends live streaming fragment request corresponding with next live streaming segment, the target timeslicing parameters are next fragment data
Timeslicing parameters;
If the current slice data are the last one fragment data of the live stream, institute is sent to the player
Current slice data are stated, player plays current live segment corresponding with the current slice data are triggered, so that institute
Player is stated after completing to play the current live segment, terminates live play.
Above-mentioned method, it is optionally, described close according to the timeslicing parameters, target authentication code, address aging time, target
Key version number and live file name carry out antitheft certification to target live streaming address, comprising:
It determines request time corresponding with the live streaming fragment request, and judges whether the request time exceeds describedly
Location expired time;
If the request time is sent without departing from the address aging time to pre-set authentication management server
Secret key request message corresponding with the target cipher key version number;
It is being fed back according to the secret key request message with the target cipher key version when receiving the authentication management server
When this number corresponding target cipher key group, according to the fragment number in the live file name and the timeslicing parameters, it is determining with it is described
The corresponding target encryption method of target cipher key group;
Using the target encryption method, to the target cipher key version number, fragment number, live file name and address aging
Time is encrypted, and current authentication code is generated;
The target authentication code is matched with the current authentication code, judges the target authentication code and described current
Whether authentication code is consistent;
If the target authentication code is consistent with the current authentication code, recognized by the way that the antitheft of address is broadcast live to the target
Card.
Above-mentioned method, optionally, further includes:
If not including timeslicing parameters corresponding with the live streaming fragment request in the live information, it is determined that the broadcasting
The live streaming fragment request corresponding with target live streaming address that device is sent to the fringe node for the first time;
Target live streaming address is parsed, target authentication code, the address aging for including in target live streaming address are obtained
Time, target cipher key version number and live file name;
According to the target authentication code, address aging time, target cipher key version number and live file name, to the target
Address is broadcast live and carries out antitheft certification;
When by the target be broadcast live address antitheft certification when, read in real time in pre-set live streaming source station with institute
State the corresponding live stream of segment to be broadcast live, and live streaming picture group GOP data corresponding with the live stream;
The GOP data are sent to the player, trigger the player according to the GOP data playback with it is described
The corresponding live streaming picture of live stream;
The burst information for including in the live stream is obtained, and fragment is carried out to the live stream according to the burst information
Processing, obtains multiple fragment datas;
Each fragment data is subjected to label according to playing sequence corresponding with the live stream, and by label
And first fragment data for carrying next timeslicing parameters is sent to the player, triggers the player to described first
Fragment data is parsed, and is obtained current live segment and is broadcast live broadcasting, and requests again according to next timeslicing parameters
The fringe node obtains next fragment data.
Above-mentioned method, optionally, further includes:
The quantity of generated each fragment data corresponding with the live stream in fringe node described in real-time detection;
When the quantity of each timeslicing parameters corresponding with the live stream in the fringe node is more than pre-set deposit
When storing up quantity, time earliest fragment data will be generated and deleted, so that corresponding with the live stream point in the fringe node
The quantity of sheet data is no more than the storage quantity.
Above-mentioned method, optionally, further includes:
When the antitheft certification not by the target being broadcast live address, interrupts and sent and the segment to the player
Number corresponding fragment data.
A kind of antitheft chain apparatus, comprising:
First acquisition unit, for determining and the live streaming piece when receiving the live streaming fragment request of player transmission
Section requests corresponding segment to be broadcast live, and obtains the live information for including in the live streaming fragment request and target live streaming address;
First judging unit, for judge in the live information whether include and corresponding point of the live streaming fragment request
Piece parameter;
First determination unit, if for joining in the live information comprising fragment corresponding with the live streaming fragment request
Number, it is determined that the player is not the live streaming piece corresponding with target live streaming address sent for the first time to the fringe node
Section request, and obtain the target authentication code for including in target live streaming address, the address aging time, target cipher key version number and
Live file name;
Authentication unit, for according to the timeslicing parameters, target authentication code, address aging time, target cipher key version number
And live file name, antitheft certification is carried out to target live streaming address;
Second acquisition unit, for when the antitheft certification by the target being broadcast live address, obtaining the fragment ginseng
Entrained fragment number in number;
Third acquiring unit, for obtaining the current slice data to match with the fragment number, the current slice number
According to the live stream read in real time for the fringe node in pre-set live streaming source station, and according to entrained in the live stream
Burst information, the live stream is subjected to the fragment data that obtains after fragment, the live stream is the segment pair to be broadcast live
The live stream answered;
Second judgment unit judges whether the current slice data are the live stream for being based on the fragment number
The last one fragment data;
First trigger unit, if for the current slice data not being the last one fragment data of the live stream,
It is then embedded in target timeslicing parameters in the current slice data, and the current slice data for carrying target timeslicing parameters are sent
To the player, player plays current live segment corresponding with the current slice data is triggered, and according to institute
It states target timeslicing parameters and sends live streaming fragment request corresponding with next live streaming segment, the target fragment to the fringe node
Parameter is the timeslicing parameters of next fragment data;
Second trigger unit, if being the last one fragment data of the live stream for the current slice data,
The current slice data are sent to the player, trigger that the player plays are corresponding with the current slice data to be worked as
Preceding live streaming segment, so that the player after completing to play the current live segment, terminates live play.
A kind of anti-stealing link method, the method are applied to player, which comprises
When receiving live play triggering command every time, live streaming letter corresponding with the live play triggering command is obtained
Breath, and determine segment to be broadcast live corresponding with the live information;
Key request is sent to pre-set authentication management server, and receives the authentication management server according to institute
The current key group of key request feedback is stated, determines current key version number corresponding with the current key group;
Detecting the player whether there is live streaming address corresponding with the segment to be broadcast live;
When the player is not present with described when segment corresponding live streaming address is broadcast live, to pre-set scheduler
Send Address requests corresponding with the segment to be broadcast live;
When receiving the current live address that the scheduler is fed back according to the Address requests, it is arranged and described current
The address corresponding address aging time is broadcast live;
The current live address is parsed, live file name corresponding with the live information is obtained;
According to the address aging time, current key group, live information and live file name, target authentication code is generated,
And encapsulate the target authentication code, address aging time and current key version number into the current live address, it obtains
Address is broadcast live in target;
The live streaming segment for carrying the target live streaming address and the live information is sent to pre-set fringe node
Request triggers the fringe node according to the target authentication code in the live information and target live streaming address, address mistake
Time phase, live file name and current key version number carry out antitheft certification;
When receiving the current slice data corresponding with the live streaming fragment request of the fringe node feedback, determine
The fringe node passes through to the antitheft of the target authentication code, address aging time, live file name and current key version number
Certification, and the current slice data are parsed, obtain current live segment corresponding with the current slice data;
The current live segment is played out on the pre-set display page, and in the currently playing segment
Playing process in, detect the current slice data with the presence or absence of target timeslicing parameters, the target timeslicing parameters are next
The timeslicing parameters of fragment data;
If the current slice data include the target timeslicing parameters, it is determined that the current slice data are to broadcast
Triggering command is put, and generates the live information of next segment to be broadcast live according to the target timeslicing parameters, executes the broadcasting
Device is every time to the process of fringe node request live streaming segment to be played;
If the current slice data do not include the target timeslicing parameters, broadcasting for the current live segment is completed
When putting, terminate live play process.
Above-mentioned method, it is optionally, described according to the address aging time, current key group, live information and live streaming
Filename generates target authentication code, comprising:
It whether detects in the live information comprising timeslicing parameters corresponding with the segment to be broadcast live;
It is literary according to the live streaming when not including with described when segment corresponding timeslicing parameters are broadcast live in the live information
Part name generates encryption method corresponding with the current key group;
The live file name, key group version number and address aging time are encrypted using the encryption method,
Generate target authentication code.
Above-mentioned method optionally receives the working as corresponding with the live streaming fragment request of the fringe node feedback
Before preceding fragment data, further includes:
The fringe node is received by returning to live streaming picture corresponding with the segment to be broadcast live after the antitheft certification
Face group GOP data;
Parse the GOP data, play live streaming picture corresponding with the GOP data, and receive the fringe node according to
The fragment data returned according to the live information.
Above-mentioned method, optionally, further includes:
When in the live information comprising when segment corresponding timeslicing parameters are broadcast live, obtaining the fragment ginseng with described
Number, and parse the fragment number that the timeslicing parameters obtain fragment data to be obtained;
According to the live file name and the fragment number, the determining current encryption method with the current key group;
Using the current encryption method, when to the live file name, key group version number, fragment number and address aging
Between encrypted, generate target authentication code.
Above-mentioned method, optionally, the detection current slice data whether there is target timeslicing parameters, comprising:
The each piecemeal field for including in the fragment data is obtained, and in the playing process of the current live segment
In, successively parse each piecemeal field;
When parsing to target segment field, detects whether to carry in the target segment field and join with the target fragment
The corresponding fragment number of number, the target segment field are the penultimate piecemeal field in each piecemeal field;
If carrying fragment number corresponding with the target timeslicing parameters in the target segment field, it is determined that described current
There are the target timeslicing parameters for fragment data;
If fragment number corresponding with the target timeslicing parameters is not carried in the target segment field, it is determined that described to work as
The target timeslicing parameters are not present in preceding fragment data.
A kind of antitheft chain apparatus, comprising:
4th acquiring unit, for obtaining and being touched with the live play when receiving live play triggering command every time
Send instructions corresponding live information, and determines segment to be broadcast live corresponding with the live information;
First transmission unit for sending key request to pre-set authentication management server, and receives the mirror
The current key group that authority management server is fed back according to the key request determines corresponding with the current key group current close
Key version number;
First detection unit, for detecting the player with whether there is live streaming corresponding with the segment to be broadcast live
Location;
Second transmission unit, for being not present with described when segment corresponding live streaming address is broadcast live when the player,
To pre-set scheduler dispatches Address requests corresponding with the segment to be broadcast live;
Setting unit, for when receiving the current live address that the scheduler is fed back according to the Address requests,
The address aging time corresponding with the current live address is set;
First resolution unit obtains live streaming text corresponding with the live information for parsing the current live address
Part name;
Generation unit, for according to the address aging time, current key group, live information and live file name, life
It encapsulates at target authentication code, and by the target authentication code, address aging time and current key version number to described current straight
It broadcasts in address, obtains target and address is broadcast live;
Third transmission unit carries target live streaming address and described straight for sending to pre-set fringe node
The live streaming fragment request for broadcasting information triggers the fringe node according in the live information and target live streaming address
Target authentication code, address aging time, live file name and current key version number carry out antitheft certification;
Second resolution unit, for corresponding with the live streaming fragment request current when receiving the fringe node feedback
When fragment data, determine that the fringe node passes through to the target authentication code, address aging time, live file name and current close
The antitheft certification of key version number, and the current slice data are parsed, it obtains corresponding with the current slice data current straight
Broadcast segment;
Second detection unit, for the current live segment to be played out on the pre-set display page, and
In the playing process of the currently playing segment, detecting the current slice data whether there is target timeslicing parameters, described
Target timeslicing parameters are the timeslicing parameters of next fragment data;
Execution unit, if including the target timeslicing parameters for the current slice data, it is determined that described current point
Sheet data is live play triggering command, and the live streaming letter of next segment to be broadcast live is generated according to the target timeslicing parameters
Breath executes the player every time to the process of fringe node request live streaming segment to be played;
End unit is worked as described in the completion if not including the target timeslicing parameters for the current slice data
When the broadcasting of preceding live streaming segment, terminate live play process.
A kind of anti-stealing link system, comprising:
Fringe node, player, live streaming source station, scheduler and authentication management server;
The fringe node, the live stream for being sent for receiving the live streaming source station, and according in the live stream
Burst information, by the live streaming flow fragmentation at multiple fragment datas;When the player sends live streaming fragment request, execute
Such as the method for above-mentioned door chain;
The player, for executing the method such as above-mentioned door chain when receiving live play triggering command every time;
The live streaming source station, for for the insertion per live stream all the way and burst information corresponding per live stream all the way, and by
The live stream for being inserted into burst information is sent to the fringe node;
The scheduler, for being the broadcasting according to the Address requests when receiving the Address requests of player
Device feedback live streaming address;
The authentication management server, for generating new key group in real time, by pre-set api interface with it is described
Fringe node and player connection, so that the fringe node and the player obtain key by the api interface
Group.
Compared with prior art, the present invention includes the following advantages:
The present invention provides a kind of anti-stealing link method, in this way, sending live streaming to fringe node every time from player
Before fragment request, first according to address expired time, current key group, live information and live file name, target authentication code is generated,
The target authentication code and target cipher key version number are encapsulated into target live streaming address again, fringe node is receiving player hair
After the live streaming fragment request that the carrying target live streaming address sent is sent, antitheft certification is carried out.Due to address aging time and target
Authentication code and target cipher key version number have timeliness, will carry out antitheft certification in each acquisition live streaming segment, prevent non-
Method user obtains live content by stealing chain mode, reduces bandwidth cost, reduces the economic loss of live video provider.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis
The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of method flow diagram of anti-stealing link method provided in an embodiment of the present invention;
Fig. 2 is a kind of method schematic diagram of anti-stealing link method provided in an embodiment of the present invention;
Fig. 3 is a kind of another method schematic diagram of anti-stealing link method provided in an embodiment of the present invention;
Fig. 4 is a kind of structure drawing of device of antitheft chain apparatus provided in an embodiment of the present invention;
Fig. 5 is a kind of another method flow diagram of anti-stealing link method provided in an embodiment of the present invention;
Fig. 6 is a kind of another structure drawing of device of antitheft chain apparatus provided in an embodiment of the present invention;
Fig. 7 is a kind of system construction drawing of anti-stealing link system provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
In this application, relational terms such as first and second and the like be used merely to by an entity or operation with
Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities
The relationship on border perhaps sequence the terms "include", "comprise" or any other variant thereof is intended to cover non-exclusive inclusion, from
And to include the process, method, article or equipments of a series of elements not only to include those elements, but also including not bright
The other element really listed, or further include for elements inherent to such a process, method, article, or device.Do not having
In the case where more limitations, the element that is limited by sentence "including a ...", it is not excluded that include the element process,
There is also other identical elements in method, article or equipment.
The present invention can be used in numerous general or special purpose computing device environment or configurations.Such as: personal computer, service
Device computer, handheld device or portable device, laptop device, multi-processor device including any of the above devices or devices
Distributed computing environment etc..
The embodiment of the invention provides a kind of anti-stealing link method, this method can be applied in multiple systems platform, be executed
Main body can be the fringe node in CDN system, and the method flow diagram of the method is as shown in Figure 1, specifically include:
S101: when receiving the live streaming fragment request of player transmission, determination is corresponding with the live streaming fragment request
Segment to be broadcast live, and obtain the live information for including in the live streaming fragment request and target live streaming address;
In embodiments of the present invention, when fringe node receives the live streaming fragment request of player transmission, determine that this is broadcast
Put the segment to be broadcast live for the broadcasting that device to be requested.Obtain the live information for including in the live streaming fragment request and target live streaming ground
Location.It wherein, include live streaming room number, main broadcaster's title, live streaming type etc. in the live information.It is to obtain to be somebody's turn to do that address, which is broadcast live, in the target
The corresponding address of segment to be broadcast live.
S102: whether judge in the live information comprising timeslicing parameters corresponding with the live streaming fragment request;
In embodiments of the present invention, whether judge in the live information comprising timeslicing parameters.That is, it is judged that the live streaming segment is asked
Seeking Truth is no to send live streaming fragment request corresponding with segment to be broadcast live is somebody's turn to do to fringe node for the first time for the player.
S103: if in the live information including timeslicing parameters corresponding with the live streaming fragment request, it is determined that described
Player is not the live streaming fragment request corresponding with target live streaming address sent for the first time to the fringe node, and is obtained
Target authentication code, address aging time, target cipher key version number and the live file name for including in target live streaming address;
In embodiments of the present invention, if containing timeslicing parameters in the live information, show the live streaming fragment request not
It is that the player sends live streaming fragment request corresponding with the segment to be broadcast live to fringe node for the first time, i.e., receives at this
Before the live streaming fragment request, which has sent upper live streaming fragment request corresponding with the live stream, and obtains one
Segment is broadcast live.Meanwhile obtaining the target authentication code for including in target live streaming address, address aging time, target cipher key version
Number and live file name.Wherein, the target authentication code, address aging time and target cipher key version number have encapsulated in advance to the mesh
In mark live streaming address.
It should be noted that the address aging time is the expired time that address is broadcast live in the target.Each live streaming address
All it is time-effectiveness, has spent the address aging time corresponding with the live streaming address, then the fringe node will not be anti-to player
Feedback live streaming segment.
S104: according to the timeslicing parameters, target authentication code, address aging time, target cipher key version number and live streaming text
Part name carries out antitheft certification to target live streaming address;
In embodiments of the present invention, the fringe node is according to timeslicing parameters, target authentication code, address aging time, target
Key version number and live file name carry out antitheft certification to target live streaming address, are non-to prevent target live streaming address
After address is broadcast live by the target that illegal means is stolen in method user, live streaming is obtained using illegal technical modelling target live streaming address
Segment.
It should be noted that address mould can be broadcast live according to the target after if illegal user steals target live streaming address
The target authentication in live streaming address intending a similar live streaming address, but simulating, address aging time and target cipher key version
This number may be changed, therefore player feedback live streaming segment can be determined whether by antitheft certification.
S105: it when the antitheft certification by the target being broadcast live address, obtains in the timeslicing parameters entrained
Fragment number;
In embodiments of the present invention, when target live streaming address is by the antitheft certification of the fringe node, then the mesh is proved
Mark live streaming address is not the live streaming address that illegal user is stolen by illegal means.At this point, the fringe node obtains the fragment
The fragment number carried in parameter.
S106: obtaining the current slice data to match with the fragment number, and the current slice data are the edge
Node reads the live stream in pre-set live streaming source station in real time, and according to burst information entrained in the live stream,
The live stream is carried out to the fragment data obtained after fragment, the live stream is the corresponding live stream of the segment to be broadcast live;
In embodiments of the present invention, it after getting the fragment number, is obtained and the fragment number phase according to the fragment number
The fragment data matched.Wherein, which is the live stream that the fringe node reads that live streaming source station is sent in real time, straight according to this
The burst information in stream is broadcast, the fragment data obtained after fragment is carried out to the live stream.
It should be noted that live streaming source station is that each is straight after receiving the live stream that each live streaming plug-flow end is sent
It broadcasts stream and is all inserted into burst information.The burst information may include that corresponding live stream should obtain after fragment sequence number, fragment
The playing duration of live streaming segment corresponding to each timeslicing parameters obtained.
S107: be based on the fragment number, judge the current slice data whether be the live stream the last one point
Sheet data;
In embodiments of the present invention, according to the fragment number, judge whether the current slice data are the live stream
The last one fragment data, that is, judge the fragment number whether be the fringe node be the live stream carry out fragment after the last one
Fragment data.
S108: if the current slice data are not the last one fragment data of the live stream, described current
It is embedded in target timeslicing parameters in fragment data, and the current slice data for carrying target timeslicing parameters are sent to the broadcasting
Device triggers player plays current live segment corresponding with the current slice data, and according to the target fragment
Parameter sends live streaming fragment request corresponding with next live streaming segment to the fringe node, and the target timeslicing parameters are next
The timeslicing parameters of fragment data;
It in embodiments of the present invention, will be next if current slice data are not the last one fragment data of live stream
In the timeslicing parameters insertion current slice data of a fragment data.It, should i.e. when sending the current slice number data to player
The timeslicing parameters of next fragment data are carried in current slice data.It wherein, include next fragment to be obtained in the timeslicing parameters
The fragment number of data.Player can determine the live streaming whether processing is over according to the timeslicing parameters in current slice data, if working as
There are timeslicing parameters in preceding fragment data, then prove to continue to fringe node request under there are also next section of fragment data
The corresponding live streaming segment of one section of fragment data.
It should be noted that when needing to obtain fragment data, side receives fringe node since live streaming is real-time perfoming
Live stream side carries out fragment to the live stream, while also needing for the fragment data of fragment to be sent to according to live streaming fragment request and broadcast
Put device.
S109: if the current slice data are the last one fragment data of the live stream, to the player
The current slice data are sent, player plays current live segment corresponding with the current slice data is triggered,
So that the player after completing to play the current live segment, terminates live play.
In embodiments of the present invention, if current slice data are the last one fragment data of live stream, show the fragment
The corresponding live streaming segment of data is the last one live streaming segment of live stream, then sends current slice data to player.Wherein,
The current fragment data does not include timeslicing parameters.The current slice data for not including timeslicing parameters are sent to player, this is broadcast
Live streaming segment corresponding with the fragment data can be played to the current fragment data by putting device, and after playing the live streaming segment,
Terminate live play.
The present invention is implemented in the anti-stealing link method provided, and it is straight to parse this after receiving live streaming fragment request for fringe node
The live information in fragment request is broadcast, to determine whether there is timeslicing parameters.If it does not exist, then prove that the live streaming fragment request is
Fragment request is broadcast live for the first time;If it exists, then prove that fragment request is broadcast live to be non-in the live streaming fragment request for the first time.When in live information
There are when timeslicing parameters, address is broadcast live according to the target in the live streaming fragment request, obtains in target live streaming address and includes
Target authentication code, address aging time, target cipher key version number and live file name.When by target authentication code, address aging
Between, target cipher key version number, live file name and timeslicing parameters antitheft certification is carried out to target live streaming address, to determine whether
There are illegal users to be broadcast live address viewing live streaming by usurping target.If certification passes through, prove that there is currently no illegal users
Address is broadcast live by the target stolen to be broadcast live by third party's player plays.Fringe node is according to the segment for including in timeslicing parameters
Number, obtain the current slice data to match with the fragment number, and judge the fragment data whether be and the live streaming fragment request
The last one fragment data of corresponding live stream.If not the last one fragment data, then in this prior in fragment data
It is embedded in the timeslicing parameters of next fragment data.It, then will not be again in current slice data if it is the last one fragment data
It is embedded in timeslicing parameters.The fringe node is after sending player for the current fragment data, and the player is according to this current point
Sheet data is broadcast live segment broadcasting.Meanwhile if in the current fragment data including the timeslicing parameters of next fragment data,
Player can be sent corresponding with next fragment data straight according to the timeslicing parameters of next fragment data to fringe node
Broadcast fragment request.If the current fragment data does not include the timeslicing parameters of next fragment data, complete in the player plays
After live streaming segment corresponding with the current fragment data, terminate live play.
It should be noted that player includes after getting current slice data, according in the current fragment data
When timeslicing parameters send live streaming fragment request next time to the fringe node, which is being received and next fragment number
After corresponding live streaming fragment request, the process of above-mentioned steps S101~S108 is executed.Until current fragment data is last
One fragment data.
It should also be noted that, the fringe node is when sending the current fragment data to player, using http piecemeal
The mode of transmission coding HTTP Chunked Encoding sends fragment data to player.Wherein, include in the fragment data
Multiple piecemeal field chunk, and the extended field chunk_ of the previous chunk in the last one piecemeal field last_chunk
Next timeslicing parameters are embedded in ext.Player side plays live streaming segment corresponding with current slice data, and side is read each
chunk。
Using in method provided in an embodiment of the present invention, when receiving the live streaming fragment request of player transmission every time,
Antitheft certification is carried out to the target live streaming address in live streaming fragment request, and sends to player after certification passes through and piece is broadcast live
The corresponding fragment data of section, so that player every time when needing to play live streaming segment, sends live streaming segment to fringe node and asks
It asks, and to carry out antitheft certification every time.Thus can guarantee can effectively recognise that there are illegal users to steal
Chain.Guarantee that the live streaming resource of network direct broadcasting platform is not stolen, reduce bandwidth cost, prevent live video provider it is economical by
To loss.
Optionally, it is based on above-mentioned steps S104, when by fringe node according to timeslicing parameters, target authentication code, address aging
Between, after target cipher key version number and live file name carry out antitheft certification, specifically further include:
When the antitheft certification not by the target being broadcast live address, interrupts and sent and the segment to the player
Number corresponding fragment data.
In method provided in an embodiment of the present invention, if fringe node is to timeslicing parameters, target authentication code, address aging
Between, target cipher key version number and live file name carry out authentification failure after antitheft certification, then prove that target live streaming address may
It is illegal user after stealing live streaming address, live streaming fragment request is sent by third party's player.The live streaming being stolen at this time
Target authentication code, address aging time, target cipher key version number and live file name in address are all mismatched or are not present, because
This certification will not pass through.And address aging time specific timeliness, even if after stealing target live streaming address by illegal user, if
Current time exceeds the address aging time, and illegal user can not also obtain live streaming segment.
In method provided in an embodiment of the present invention, it is based on above-mentioned steps S104, it is described to recognize according to the timeslicing parameters, target
Code, address aging time, target cipher key version number and live file name are demonstrate,proved, antitheft certification is carried out to target live streaming address
Process is as shown in Fig. 2, specifically include:
S201: it determines request time corresponding with the live streaming fragment request, and judges whether the request time exceeds
The address aging time;
In embodiments of the present invention, target authentication code, address aging time, target cipher key version number and live streaming are being got
After filename, first judge whether the request time of current request live streaming segment is expired.I.e. whether the request time exceeds the address
Expired time.For example, request time is 11 points of July 1 in 2019 when address expired time is 00 minute 12 points of on July 1st, 2019
58 timesharing, the request time are not out of date.It is 12: 01 timesharing on July 1 in 2019 between upon request, the request time is out of date.
Optionally, the address aging time of target live streaming address is set by pre-set authentication management server
It sets.The time of address can be broadcast live in authentication management server according to player requests, and address expired time is arranged.For example, player
The time that address is broadcast live in current request is 55 minutes 11 points of on July 1st, 2019, then it is 2019 7 that the address aging time, which can be set,
Month 1 day 12 points 00 minute.
Further, the address aging time can also by player receive scheduler feedback live streaming address after,
The address aging time corresponding with the live streaming address is set.
S202: if the request time without departing from the address aging time, to pre-set authentication management service
Device sends secret key request message corresponding with the target cipher key version number;
In embodiments of the present invention, if the address aging time is within the request time, show the non-mistake of the request time
Phase, within the effective time of target live streaming address.At this point, the fringe node will be sent and the key to authentication management server
The corresponding secret key request message of version number.
It should be noted that saving multiple key groups in the authentication management server, and raw according to period regular hour
At a key group, each key group has a corresponding key version number.When fringe node needs to manage to authentication
When managing server transmission key request, which is sent by the api interface connected between authentication management server.
S203: when receive the authentication management server fed back according to the secret key request message it is close with the target
When the corresponding target cipher key group of key version number, according to the fragment number in the live file name and the timeslicing parameters, determine with
The corresponding target encryption method of the target cipher key group;
In embodiments of the present invention, authentication management server receive fringe node transmission secret key request message after,
Target cipher key group corresponding with the secret key request message is fed back to fringe node.When fringe node is receiving authentication management clothes
When the target cipher key group for device feedback of being engaged in, according to the fragment number in live file name and timeslicing parameters, the determining and target cipher key group
Corresponding target encryption method.
Wherein, which can be Hash calculation algorithm MD5, shal Encryption Algorithm etc..
S204: the target encryption method is applied, to the target cipher key version number, fragment number, live file name and ground
Location expired time is encrypted, and current authentication code is generated;
In embodiments of the present invention, after determining target encryption method corresponding with the target cipher key group, using the encryption
Method adds the address aging time in target live streaming address, and target cipher key group corresponding with target cipher key version number
It is close, generate current authentication code.
It should be noted that current authentication code, address aging time, target authentication code and target cipher key version number are all
The form of plaintext.Optionally, the current authentication code, which can be, carries out coding acquisition by base64 coding mode, using the encryption
Method encrypts address expired time, live file name, fragment number and target cipher key version number.Wherein base64 coding allows
Target authentication code is converted into printable text after encryption;
S205: the target authentication code is matched with the current authentication code, judges the target authentication code and institute
Whether consistent state current authentication code;
In the embodiment of the present invention, since target authentication code is consistent with the generating process of current authentication code, target is recognized
Card code is matched with current authentication code, judges the consistency of target authentication code Yu current authentication code, it may be determined that target live streaming
Whether address is that illegal user is used to steal the illegal address that resource is broadcast live.That is, player is sending live streaming piece to fringe node
Before section request, encryption method also is generated using live file name and fragment number, and by the encryption method of generation to live file
Name, target cipher key group and address aging time carry out encryption and generate target authentication code.
S206: if the target authentication code is consistent with the current authentication code, by the way that address is broadcast live to the target
Antitheft certification.
In embodiments of the present invention, if the target authentication code is consistent with current authentication code, prove that address is broadcast live in the target
Not for illegal user by analogue data interface or from back door steal live streaming address after, by third-party player into
Row obtains live streaming segment, therefore fringe node passes through the antitheft certification to target live streaming address.
In anti-stealing link method provided in an embodiment of the present invention, during carrying out antitheft certification, prejudges and be broadcast live
Whether the corresponding request time of fragment request exceeds the address aging time of target live streaming address.If request time is beyond address
Expired time then proves target live streaming address also within term of validity.Meanwhile key request is sent to authentication management server
Message wherein includes the corresponding target cipher key version number of key group of request in the secret key request message.Work as authentication management
After server receives secret key request message, the target cipher key version number is obtained from the secret key request message, and according to the mesh
Mark key version number obtains the pre-stored target cipher key group to match with the target cipher key version number, and by the target cipher key
Group is sent to fringe node.Fringe node is straight according to target after the target cipher key group for receiving the transmission of authentication management server
The fragment number of the live file name and timeslicing parameters in address is broadcast, determines encryption method corresponding with the target cipher key group, and lead to
It crosses the encryption method to encrypt target cipher key version number, fragment number, live file name and address aging time, generate current
Authentication code.It verifies current authentication code and whether target authentication code is consistent, antitheft certification passes through if consistent.
It should be noted that address aging time and target cipher key version number all have timeliness.Player is being sent out every time
When sending live streaming fragment request, address aging time and target cipher key version number and the last live streaming fragment request sent are not necessarily
It is identical, further prevent stealing chain person according to the live streaming address acquisition live streaming resource stolen.
Optionally, if target authentication code and current authentication code are inconsistent, prove that target live streaming address is illegal user
The live streaming address obtained by back door.Illegal user asks after stealing target live streaming address by third party's player
When seeking acquisition live streaming segment, live file name, the target cipher key group etc. in the live streaming address can not be obtained.And since address is broadcast live
All time-effectiveness confirm target live streaming address for illegal user's use once having spent the address aging time of target live streaming address
To obtain the live streaming address of live streaming segment.
Further, if the target authentication code for including in target live streaming address, address mistake has not been obtained in fringe node
Any one in time phase, target cipher key version number and live file name, then it is assumed that there is currently illegal users using illegal
The live streaming address that approach obtains carries out obtaining live streaming segment.
Using method provided in an embodiment of the present invention, since illegal user is straight using stealing by third party's player
When broadcasting address and being broadcast live fragment request, key group can not be obtained, even if obtaining key group, address aging time and current close
Key version number also time-effectiveness, therefore illegal user can not utilize the live streaming address duration request live streaming segment stolen.Edge section
Point is guaranteed that the live streaming resource of network direct broadcasting platform is not stolen, is dropped by the antitheft certification to address expired time and authentication code
Low bandwidth cost prevents the economy of live video provider from incurring loss.
In method provided in an embodiment of the present invention, whether comprising being asked with the live streaming segment in determining the live information
After seeking corresponding timeslicing parameters, the detailed process not comprising timeslicing parameters is as shown in figure 3, specific further include:
S301: if not including timeslicing parameters corresponding with the live streaming fragment request in the live information, it is determined that institute
State the live streaming fragment request corresponding with target live streaming address that player is sent to the fringe node for the first time;
In embodiments of the present invention, after parsing live information, if not including in the live information and live streaming fragment request
When corresponding timeslicing parameters, show that the live streaming fragment request is that fragment request is broadcast live for the first time, i.e., the player is for the first time to edge
Node requests live streaming fragment request corresponding with the live stream.
S302: parsing target live streaming address, obtains the target authentication code for including in target live streaming address, address
Expired time, target cipher key version number and live file name;
In embodiments of the present invention, the target live streaming address for including in the live streaming fragment request is obtained, and to the target
After live streaming address is parsed, it is close to obtain target authentication code entrained in target live streaming address, address aging time, target
Key version number and live file name.
It should be noted that obtaining the target for including in target live streaming address in step S302 and above-mentioned steps S103
Authentication code, address aging time, the process of target cipher key version number and live file name are consistent, but the target in step S302 is straight
Broadcasting address is the corresponding live streaming address of fragment request to be broadcast live for the first time, and the target live streaming address in step S103 is not broadcast live for the first time
The corresponding live streaming address of fragment request.
S303: according to the target authentication code, address aging time, target cipher key version number and live file name, to institute
It states target live streaming address and carries out antitheft certification;
In embodiments of the present invention, due to the live streaming fragment request for fragment request is broadcast live for the first time, and in live information not
Comprising timeslicing parameters, therefore, the fringe node then according to the target authentication code, the address aging time, target cipher key version number and
Live file name carries out antitheft certification to target live streaming address.
It should be noted that the antitheft verification process of step S303 is similar to the antitheft verification process of above-mentioned steps S104.
Wherein, the antitheft verification process in above-mentioned steps S104 contains timeslicing parameters, and in the antitheft verification process of step S303 not
Include timeslicing parameters.
S304: when the antitheft certification by the target being broadcast live address, pre-set live streaming source station is read in real time
In live stream corresponding with the segment to be broadcast live, and live streaming picture group GOP data corresponding with the live stream;
In embodiments of the present invention, when antitheft certification passes through, then live stream corresponding with the live streaming fragment request is read,
An and nearest GOP data corresponding with the live stream.Wherein, which issued by source station is broadcast live, edge
Node updates GOP data after receiving live stream, according to the live stream.
S305: being sent to the player for the GOP data, triggers the player according to the GOP data playback
Live streaming picture corresponding with the live stream;
In embodiments of the present invention, GOP data corresponding with live stream are sent in player, triggering player according to
The picture group plays out live streaming picture corresponding with the live stream.Wherein, when fringe node is when receiving live stream, all can
Update GOP data corresponding with the live stream.Therefore, it when receiving playing request for the first time, will be sent for player straight with this
Broadcast the GOP data of stream recent renewal.
S306: the burst information for including in the live stream is obtained, and the live streaming is flowed into according to the burst information
Row segment processing obtains multiple fragment datas;
In embodiments of the present invention, the live stream issued according to live streaming source station obtains the fragment letter for including in the live stream
Breath.The burst information is that source station is broadcast live when receiving every live stream all the way that live streaming end is sent, all to insert per live stream all the way
Enter corresponding burst information.Fringe node carries out fragment according to the burst information carried in the live stream, by the live stream,
Obtain multiple fragment datas.Wherein, the corresponding one section of live streaming segment of each fragment data.
S307: each fragment data is subjected to label according to playing sequence corresponding with the live stream, and will
Label and carry the first of next timeslicing parameters fragment data and be sent to the player, trigger the player to described
First fragment data is parsed, and is obtained current live segment and is broadcast live broadcasting, and again according to next timeslicing parameters
The secondary request fringe node obtains next fragment data.
In embodiments of the present invention, after live stream is carried out fragment by fringe node, by each fragment data according to live stream
The playing sequence of each live streaming segment carries out label, when first fragment data is sent player, first fragment
The timeslicing parameters of next fragment data are carried in data.Wherein, which is corresponding with the first live streaming segment
First fragment data.Such as live stream is divided into 10 fragment datas, then the sequence of label is then 1~10.At this point, edge
The corresponding timeslicing parameters of No. 2 fragment datas are embedded in No. 1 fragment number before it will send No. 1 fragment data to player by node
It,, can be in No. 1 fragment data when player parses No. 1 fragment data after No. 1 fragment data is sent to player in
The timeslicing parameters of No. 2 fragment datas are obtained, the player can request again side according to the timeslicing parameters of No. 2 fragment datas at this time
Edge node obtains live streaming segment corresponding with No. 2 fragment datas.
It should be noted that since live streaming is the process of real-time perfoming, when receiving first live streaming fragment request, currently
The corresponding fragment number of the fragment data got is not necessarily No. 1.And fragment data is being sent to player from fringe node
In the process, it is that live stream is read on side, sends fragment data to player in fragment.
In anti-stealing link method provided in an embodiment of the present invention, if not including timeslicing parameters in live information, i.e., fragment is joined
Number is default, it is determined that live streaming fragment request transmitted by player is that fragment request is broadcast live for the first time.Fragment request is broadcast live in this for the first time
For player, request fringe node plays live streaming request corresponding with the live stream for the first time.Fringe node is according to the live streaming segment
The target live streaming address for including in request, obtains the target authentication code for including in target live streaming address, address aging time, mesh
Mark key version number and live file name.And according to target authentication code, address aging time, target cipher key version number and live streaming text
Part name carries out antitheft certification.Wherein, the process of the antitheft certification are as follows: judge current request live streaming segment request time whether mistake
Phase.I.e. whether the request time exceeds the address aging time.If, according to the key version number, being managed to authentication without expired
It manages server and sends key request corresponding with the target cipher key version number.When receive authentication management server feedback with this
When the corresponding target cipher key group of target cipher key version number, fringe node is determining with the target cipher key group pair according to live file name
The encryption method answered, and the target cipher key group and address aging time are encrypted using the encryption method, it obtains target and recognizes
Code is demonstrate,proved, target authentication code is matched with current authentication code, matching unanimously then passes through antitheft certification.Passing through antitheft certification
Afterwards, the live stream currently issued and GOP data corresponding with the live stream are obtained.Wherein, which is fringe node reception
To after live stream, the picture group data that are updated according to the live stream.It is played out GOP data are sent to player
Afterwards, according to burst information entrained in live stream, fragment is carried out to the live stream, obtains multiple fragment datas.To each it divide
Sheet data carries out label, and first fragment data is sent to player, triggers player according to first fragment data
Corresponding with first fragment data live streaming segment is played, and player is when playing live streaming segment, to first fragment
Data are parsed, and the timeslicing parameters of next fragment data are obtained, at this point, player can join according to the fragment of next fragment data
Number requests fringe node to obtain live streaming segment corresponding with next fragment data.
It should be noted that being played when fringe node is after sending first fragment data to player when receiving
Device according to the timeslicing parameters carried in first fragment data again request live streaming segment when, execute above-mentioned steps S101~
The process of S108 will not repeat again herein.
It also will be to the target when not including timeslicing parameters in live information using method provided in an embodiment of the present invention
Address is broadcast live and carries out antitheft certification, guarantees that the live streaming resource of network direct broadcasting platform is not stolen, reduces bandwidth cost, prevent from being broadcast live
The economy of video provider incurs loss.
In method provided in an embodiment of the present invention, optionally, further includes:
The quantity of generated each fragment data corresponding with the live stream in fringe node described in real-time detection;
When the quantity of each timeslicing parameters corresponding with the live stream in the fringe node is more than pre-set deposit
When storing up quantity, time earliest fragment data will be generated and deleted, so that corresponding with the live stream point in the fringe node
The quantity of sheet data is no more than the storage quantity.
In method provided in an embodiment of the present invention, fringe node is carried out when reading live stream every time to the live stream
While fragment obtains fragment data, the fragment corresponding with the live stream that can also currently be also easy to produce in real-time detection fringe node
Data bulk.When the quantity of fragment data is more than storage quantity, the fragment data generated earliest is deleted.
It should be noted that live streaming segment deletion is the regular behavior of fringe node, can be cached by defaulting the fringe node by 2
Segment deletes segment earliest in caching after newly generating a segment.Because viewing is the same as live stream all the way, the edge
Node can service multiple player clients simultaneously, and only new segment generates, and can just execute the movement of refreshing and deletion.
The specific implementation process and its deriving mode of above-mentioned each embodiment, it is within the scope of the present invention.
Corresponding with method described in Fig. 1, the embodiment of the invention also provides a kind of antitheft chain apparatus, for in Fig. 1
The specific implementation of method, antitheft chain apparatus provided in an embodiment of the present invention can be applied in fringe node, structural schematic diagram
As shown in figure 4, specifically including:
First acquisition unit 401, for determining and the live streaming when receiving the live streaming fragment request of player transmission
The corresponding segment to be broadcast live of fragment request, and obtain the live information for including in the live streaming fragment request and target live streaming ground
Location;
First judging unit 402, for whether judging in the live information comprising corresponding with the live streaming fragment request
Timeslicing parameters;
First determination unit 403, if for including fragment corresponding with the live streaming fragment request in the live information
Parameter, it is determined that the player is not the live streaming corresponding with target live streaming address sent for the first time to the fringe node
Fragment request, and obtain the target authentication code for including in target live streaming address, address aging time, target cipher key version number
And live file name;
Authentication unit 404, for according to the timeslicing parameters, target authentication code, address aging time, target cipher key version
Number and live file name, antitheft certification is carried out to target live streaming address;
Second acquisition unit 405, for obtaining the fragment when the antitheft certification by the target being broadcast live address
Entrained fragment number in parameter;
Third acquiring unit 406, for obtaining the current slice data to match with the fragment number, the current slice
Data are that the fringe node reads live stream in pre-set live streaming source station in real time, and according to being taken in the live stream
The live stream, is carried out the fragment data obtained after fragment by the burst information of band, and the live stream is the segment to be broadcast live
Corresponding live stream;
Second judgment unit 407 judges whether the current slice data are the live streaming for being based on the fragment number
The last one fragment data of stream;
First trigger unit 408, if for the current slice data not being the last one fragment number of the live stream
According to, then in the current slice data be embedded in target timeslicing parameters, and will carry target timeslicing parameters current slice data
It is sent to the player, triggers player plays current live segment corresponding with the current slice data, and according to
Live streaming fragment request corresponding with next live streaming segment, the target are sent to the fringe node according to the target timeslicing parameters
Timeslicing parameters are the timeslicing parameters of next fragment data;
Second trigger unit 409, if being the last one fragment data of the live stream for the current slice data,
The current slice data then are sent to the player, it is corresponding with the current slice data to trigger the player plays
Current live segment, so that the player after completing to play the current live segment, terminates live play.
First acquisition unit 401, the first judging unit 402 in the above antitheft chain apparatus disclosed by the embodiments of the present invention,
First determination unit 403, authentication unit 404, second acquisition unit 405, third acquiring unit 406, second judgment unit 407,
The specific work process of first trigger unit 408 and the second trigger unit 409, reference can be made to preventing disclosed in the above embodiment of the present invention
The corresponding content in chain method is stolen, is not discussed here.
The embodiment of the invention provides a kind of anti-stealing link method, this method, which can be applied, to play out live video
Player in, executing subject is player, and the method flow diagram of the method is as shown in figure 5, specifically include:
S501: when receiving live play triggering command every time, obtaining the live information of current live streaming segment to be played,
And determine segment to be broadcast live corresponding with the live information;
In embodiments of the present invention, when player is when receiving live play triggering command every time, acquisition is currently wait broadcast
Straighten the determining segment to be broadcast live of live information for broadcasting segment.The live information includes live streaming room number, main broadcaster's title, live streaming type
Deng.
It should be noted that the live play triggering command can be the live play triggering that user sends to the player
Instruction, or carry the fragment data of timeslicing parameters.
S502: key request is sent to pre-set authentication management server, and receives the authentication management server
According to the current key group of key request feedback, current key version number corresponding with the current key group is determined;
In embodiments of the present invention, it after receiving live play triggering command, can be taken to pre-set authentication management
Business device sends key request.Player receives the authentication management server by the api interface between authentication management server
The current key group being currently newly generated, and determine the current key version number in the current key group.
It should be noted that authentication management server can generate a group key group in real time, each key group carries one
Key version number.The corresponding key version number of each key group is different.
S503: detecting the player whether there is live streaming address corresponding with the segment to be broadcast live;
In embodiments of the present invention, it after receiving live play triggering command and obtaining current key group, detects this and broadcasts
It puts in device with the presence or absence of live streaming address corresponding with the segment to be broadcast live.
S504: when the player is not present with described when segment corresponding live streaming address is broadcast live, to pre-set
Scheduler dispatches Address requests corresponding with the segment to be broadcast live;
In embodiments of the present invention, when there is no live streaming addresses corresponding with the segment to be broadcast live in player, then to tune
It spends device and sends Address requests, so that address is broadcast live after receiving the Address requests, for the segment distribution to be broadcast live in the scheduler.
It should be noted that the current live address can be player is receiving live play triggering command every time
Afterwards, the live streaming address that request scheduling device generates;It is also possible to player behind the live streaming address that first time request scheduling device generates,
The live streaming address is stored, and obtains stored live streaming address when receiving live play triggering command every time.
S505: when receiving the current live address that the scheduler is fed back according to the Address requests, setting and institute
State the current live address corresponding address aging time;
In embodiments of the present invention, when the current live address of scheduler generation and to player feedback, player is being connect
When receiving current live address, address expired time is arranged according to the current live address.
It should be noted that the address aging time can be player and be autonomously generated, it can also be with authentication management server
It generates.The address aging time is used for the timeliness for guaranteeing that address is broadcast live, and prevents illegal user from stealing the current live address
Afterwards, the live content of live video provider is obtained using the current live address.
S506: parsing the current live address, obtains live file name corresponding with the live information;
In embodiments of the present invention, when getting the current live address that scheduler pre-generates, it is current straight to parse this
Address is broadcast, to obtain the live file name in the current live address.
It should be noted that it can be the stream name of main broadcaster, only one unique stream of each main broadcaster that the live file is entitled
Name.
S507: it according to the address aging time, current key group, live information and live file name, generates target and recognizes
Code is demonstrate,proved, and the target authentication code, address aging time and current key version number are encapsulated into the current live address,
It obtains target and address is broadcast live;
In embodiments of the present invention, raw according to address expired time, current key group, live information and live file name
It is encapsulated in current live address at target authentication code, and by target authentication code, current key version number, obtains target live streaming ground
Location.It include address aging time and the live file name in the current live address in target live streaming address, and carrying should
Target authentication code and current key version number.
S508: the live streaming for carrying the target live streaming address and the live information is sent to pre-set fringe node
Fragment request, trigger the fringe node according to the live information and the target live streaming address in target authentication code,
Location expired time, live file name and current key version number carry out antitheft certification;
In embodiments of the present invention, which is broadcast live address and live information is encapsulated into live streaming fragment request, and to
Pre-set fringe node sends the live streaming fragment request for carrying target live streaming address.Fringe node is triggered to be believed according to the live streaming
Address aging time, target authentication code, live file name and current key version number in breath and target live streaming address are prevented
Steal certification.
S509: when the current slice data corresponding with the live streaming fragment request for receiving the fringe node feedback
When, determine that the fringe node passes through to the target authentication code, address aging time, live file name and current key version number
Antitheft certification, and parse the current slice data, obtain current live segment corresponding with the current slice data;
In embodiments of the present invention, when fringe node is to target authentication code, address aging time, live file name and current
When the antitheft certification of key version number passes through, fringe node can feed back corresponding with the live streaming fragment request current to the player
Fragment data.At this point, parsing the fragment data when player receives current slice data, acquisition needs to play
Current live segment.
S510: the current live segment is played out on the pre-set display page, and is currently broadcast described
In the playing process of film releasing section, the current slice data are detected with the presence or absence of target timeslicing parameters, the target timeslicing parameters
For the timeslicing parameters of next fragment data;
In embodiments of the present invention, the corresponding live streaming segment of the current fragment data is played into display circle in the player
On face, and during the broadcasting segment plays out, detecting the current fragment data whether there is target timeslicing parameters,
That is, the timeslicing parameters of next fragment data.
It should be noted that the fragment data is that fringe node is sent in the form of multiple piecemeal fields, one
It include multiple piecemeal fields in fragment data, wherein point of next fragment data is carried in the piecemeal field of penultimate
Piece parameter.
S511: if the current slice data include the target timeslicing parameters, it is determined that the current slice data are
Live play triggering command, and the live information of next segment to be broadcast live is generated according to the target timeslicing parameters, execute institute
Player is stated every time to the process of fringe node request live streaming segment to be played;
In embodiments of the present invention, if the current packet segment timeslicing parameters containing target, it is determined that the current slice number
According to the live play triggering command to obtain next live streaming segment, after being characterized in current live segment, there are also next live streaming segments.
The player can encapsulate the target timeslicing parameters into live information, according to the live information under fringe node request
One live streaming segment, executes the process that live play segment is waited for each request.
It should be noted that if comprising timeslicing parameters and the timeslicing parameters are encapsulated to live information in current slice data
Afterwards, it when player plays live streaming segment corresponding with the current fragment data closes to an end, executes and each requests to obtain with described
Take the process of live streaming segment to be played, that is, execute as the process of above-mentioned steps S501~S510.
S512: if the current slice data do not include the target timeslicing parameters, the current live piece is completed
When the broadcasting of section, terminate live play process.
In embodiments of the present invention, if not including target timeslicing parameters in current slice data, the current slice is proved
The corresponding current live segment of data is the last one live streaming segment.After live streaming segment plays in this prior, terminate live streaming
The process of broadcasting.
In anti-stealing link method provided in an embodiment of the present invention, when player receives live play triggering command, obtain
Live information, and determine segment to be broadcast live.Key request is sent to authentication management server by pre-set api interface,
To obtain the current key group and the corresponding current version number of current key group that authentication management server is currently generated.When broadcasting
Put device acquire scheduler feedback current live address when, be arranged address expired time, and according to the address aging time,
Current key group, live information and live file name generate target authentication code.By the target authentication code, the address aging time and
Current key version number encapsulates to current live address, obtains target live streaming address and is sent to fringe node, so that edge
Node carries out antitheft certification according to the live information, target authentication code, current version number, live file name, address aging time.
After fringe node is by antitheft certification, fragment data is sent to player.Player is receiving working as fringe node transmission
After preceding fragment data, which is parsed, broadcasting segment is obtained and plays out, and examined during broadcasting
Survey whether the current fragment data includes target timeslicing parameters, if comprising showing that, there are also next segment to be broadcast live, determination is deserved
Preceding fragment data is the live play triggering command of next live streaming segment, which is encapsulated into live information,
The process of above-mentioned steps S501~S510 is executed according to the live information, is joined until not including target fragment in current slice data
Number terminates live play process.
It should be noted that being encoded when fringe node sends fragment data to the player by http block transmission
The mode of HTTP Chunked Encoding carries out sending each piecemeal field chunk corresponding with fragment data.By each point
Block field chunk forms fragment data.When determining live streaming segment corresponding there is also next fragment data, by next fragment number
According to target timeslicing parameters encapsulate into the extended field chunk_ext of target fragment field, read current point in player
After the last chunk of sheet data, next live streaming segment is obtained according to the target timeslicing parameters.The target segment field is inverse
Second fragment field.
Using method provided in an embodiment of the present invention, player is needing to send live streaming fragment request to fringe node every time
Before, first the target authentication code being obtained ahead of time, address aging time, current key version number are encapsulated into and carry live file
In the live streaming address of name.Since current key version number and address aging time have timeliness, obtained directly each
When broadcasting segment, fringe node can be made to carry out effective antitheft certification, with prevent from obtaining there are illegal user by illegal means
Address is broadcast live, resource is broadcast live in unauthorized theft, while reducing bandwidth cost, reduces live video provider economic loss.
In method provided in an embodiment of the present invention, based in above-mentioned steps S507, it is described according to the address aging time,
Current key group, live information and live file name generate target authentication code, comprising:
It whether detects in the live information comprising timeslicing parameters corresponding with the segment to be broadcast live;
It is literary according to the live streaming when not including with described when segment corresponding timeslicing parameters are broadcast live in the live information
Part name generates encryption method corresponding with the current key group;
The current key group and address aging time are encrypted using the encryption method, generate target authentication
Code.
Further, when in the live information comprising timeslicing parameters corresponding with band live streaming segment, further includes:
When in the live information comprising when segment corresponding timeslicing parameters are broadcast live, obtaining the fragment ginseng with described
Number, and parse the fragment number that the timeslicing parameters obtain fragment data to be obtained;
According to the live file name and the fragment number, the determining current encryption method with the current key group;
Using the current encryption method, the current key group and address aging time are encrypted, generate target
Authentication code.
In anti-stealing link method provided in an embodiment of the present invention, which is detected, is determined in the live information
It whether include timeslicing parameters.If not including, the live play triggering command being currently received is that user sends, should be wait be broadcast live
Segment is then first live streaming segment.The encryption method of current key group is only determined according to live file name at this time;If including fragment
Parameter then obtains the timeslicing parameters.According to the fragment number and live file name in the timeslicing parameters, adding for current key group is determined
Decryption method.Using the encryption method, encryption is carried out to current key group and address aging time and generates target authentication code.Player
By the target authentication code seal apparatus into live streaming address, so that fringe node recognizes the target after receiving the live streaming address
Card code is verified, and is effectively prevented illegal user and is carried out robber's chain.
Optionally, the current slice data corresponding with the live streaming fragment request of the fringe node feedback are received
Before, further includes:
The fringe node is received by returning to live streaming picture corresponding with the segment to be broadcast live after the antitheft certification
Face group GOP data;
Parse the GOP data, play live streaming picture corresponding with the GOP data, and receive the fringe node according to
The fragment data returned according to the live information.
In method provided in an embodiment of the present invention, if live streaming segment to be played is first live streaming segment, and the player will
Carry target live streaming address live streaming fragment request be sent to fringe node carry out it is antitheft certification pass through after, receive the fringe node
The GOP data corresponding with first live streaming segment of feedback.Wherein the GOP data are nearest one of fringe node real-time update
Picture group data.Player plays out corresponding picture group according to the picture group data, and receives fringe node feedback
Fragment data.
In the above-described embodiments, when not including timeslicing parameters in live information, determine that it is first straight for being somebody's turn to do segment to be broadcast live
Segment is broadcast, which sends live streaming segment to fringe node, and the detailed process for playing live streaming segment may include walking as follows
It is rapid:
1) when player receives the live play request of user's transmission, determine that live play request is live play
Triggering command;Live information is obtained, and determines segment to be broadcast live;
2) key request is sent to authentication management server, to receive the current key group of authentication management server feedback,
And determine the key version number of the current key group;
3) to scheduler dispatches Address requests, to receive the current live address of scheduler feedback, and address aging is set
Time;
4) it parses the current live address and obtains live file name, and according to the live file name, determine the current key
The encryption method of group, and key version number, live file name and address aging time are encrypted using the encryption method, it obtains
Obtain target authentication code;
5) target authentication code, address aging time and current key version number are embedded in current live address by player, are obtained
It obtains target and address is broadcast live;
6) player sends the live streaming fragment request for carrying target live streaming address to fringe node;
7) fringe node obtains the target live streaming address of the carrying in the live streaming fragment request, and parses target live streaming ground
Location obtains address aging time, live file name, target authentication code and key version number;
8) fringe node sends the request time of live streaming fragment request according to player, judges whether the request time exceeds
The address aging time;
If 9) without departing from according to the key version number, from the acquisition of authentication management server and current key version number pair
The current key group answered;
10) fringe node determines the current encryption method of current key group according to the live file name, and current according to this
Encryption method encrypts key version number, live file name and address aging time, obtains current authentication code;
11) current authentication code and target authentication code are matched;
If 12) matching is consistent, fringe node is the GOP data that player feeds back recent renewal, and is sending GOP data
The fragment data for having been inserted into timeslicing parameters is sent afterwards, is entered step 14);
If 13) matching is inconsistent, fringe node terminates to service;
14) player parses the GOP data and obtains picture group, by picture after the GOP data for receiving fringe node transmission
Face group plays out;
15) player receives the fragment data that fringe node is sent in broadcasting pictures group, and parsing fragment data obtains straight
It broadcasts segment to play out, and detects whether the fragment data includes timeslicing parameters;
If 16) fragment data includes timeslicing parameters, the player is after completing to play the live streaming segment, according to this point
Piece parameter requests fringe node to obtain live streaming segment again;
If 17) fragment data does not include timeslicing parameters, which terminates live streaming after playing the live streaming segment
Playing process.
Using method provided in an embodiment of the present invention, player will encrypt the target authentication code obtained, current key version
Number encapsulation into live streaming address, fringe node further according to the target authentication code that has encapsulated in live streaming address and key version number,
Location expired time and live file name carry out antitheft certification, prevent illegal user from obtaining live content by way of stealing chain, protect
Card reduces bandwidth cost, reduces live video provider economic loss.
In providing method of the embodiment of the present invention, it is based on above-mentioned steps S501, whether is the detection current slice data
There are target timeslicing parameters, comprising:
The each piecemeal field for including in the fragment data is obtained, and in the playing process of the current live segment
In, successively parse each piecemeal field;
When parsing to target segment field, detects whether to carry in the target segment field and join with the target fragment
The corresponding fragment number of number, the target segment field are the penultimate piecemeal field in each piecemeal field;
If carrying fragment number corresponding with the target timeslicing parameters in the target segment field, it is determined that described current
There are the target timeslicing parameters for fragment data;
If fragment number corresponding with the target timeslicing parameters is not carried in the target segment field, it is determined that described to work as
The target timeslicing parameters are not present in preceding fragment data.
In method provided in an embodiment of the present invention, player obtains the fragment data after receiving current slice data
In each piecemeal field chunk, and parse each chunk during playing current live segment, be resolved to inverse
When second chunk, it is detected with the presence or absence of fragment number.Then determine if it exists current slice data there are target timeslicing parameters,
Then current slice data do not store target timeslicing parameters to fragment number if it does not exist.
In embodiments of the present invention, if there are fragment numbers in chunk, it is determined that there is also next live streaming segments, play
Device can be according to the corresponding timeslicing parameters of the fragment number, and segment is broadcast live in request again.And execution such as above-mentioned steps S501~
The process of S512 carries out robber's chain to prevent from occurring during obtaining and segment is broadcast live illegal user, and guarantee reduces bandwidth cost, drop
Low live video provider economic loss.
In anti-stealing link method provided in an embodiment of the present invention, when in live information including timeslicing parameters, determining should be to straight
Broadcasting segment is not first live streaming segment, which sends live streaming segment to fringe node, and plays the specific mistake of live streaming segment
Journey may include steps of:
It 1), will be upper when player gets the timeslicing parameters for including in the corresponding upper fragment data of upper live streaming segment
Live play triggering command of one fragment data as this request live streaming segment;
2) live information corresponding with the live play triggering command is obtained, and determines segment to be broadcast live, to authentication management
Server sends key request, to receive the current key group of authentication management server feedback, and determines the current key group
Key version number;
3) detect whether the player stores live streaming address corresponding with first live streaming segment, if not stored, to tune
It spends device and sends Address requests, to receive the current live address of scheduler feedback, and address expired time is set;
4) it parses the current live address and obtains live file name, and obtain the timeslicing parameters in live information, according to this
The fragment number of live file name and timeslicing parameters determines the encryption method of the current key group, and using the encryption method to close
Key version number, fragment number, live file name and address aging time are encrypted, and target authentication code is obtained;
5) target authentication code, key version number and address aging time are embedded in current live address by player, obtain mesh
Mark live streaming address;
6) player sends the live streaming fragment request for carrying target live streaming address and timeslicing parameters to fringe node;
7) fringe node obtains target live streaming address and the timeslicing parameters of the carrying in the live streaming fragment request, and parsing should
Target is broadcast live address and obtains address aging time, live file name, key version number and address aging time;
8) fringe node sends the request time of live streaming fragment request according to player, judges whether the request time exceeds
The address aging time;
If 9) without departing from according to the current key version number, from the acquisition of authentication management server and current key version
Number corresponding current key group;
10) fragment number that fringe node should carry in the live file name and timeslicing parameters, determines current key group
Current encryption method, and according to the current encryption method, to live file name, fragment number, key group version number and address aging
Time is encrypted, and current authentication code is obtained;
11) current authentication code and target authentication code are matched, matches consistent execution step 12);Match inconsistent hold
Row step 15);
12) according to the fragment number in timeslicing parameters, the fragment data to match with the fragment number is obtained, and detects the fragment
Whether data are the last one fragment data;
13) if it is not, fragment data is sent to player again after next timeslicing parameters are then embedded in fragment data, into step
It is rapid 16);
14) it if so, the fragment data is directly sent to player, enters step 16)
15) fringe node terminates to service;
16) player obtains live streaming segment and carries out in the fragment data for receiving fringe node transmission, parsing fragment data
It plays, and detects whether the fragment data includes timeslicing parameters;
If 17) fragment data includes timeslicing parameters, which executes again after completing to play the live streaming segment
Above-mentioned steps 1);
If 18) fragment data does not include timeslicing parameters, which terminates live streaming after playing the live streaming segment
Playing process.
If it should be noted that address, or simulation real user request live streaming is broadcast live in illegal user in transmission process
It is distorted during segment in this four field contents of live file name, fragment number, key group version number and address aging time
Any one of, the inevitable authentication code generated with player of the authentication code that fringe node is calculated is inconsistent.
Corresponding with method described in Fig. 5, the embodiment of the invention also provides a kind of antitheft chain apparatus, for in Fig. 5
The specific implementation of method, antitheft chain apparatus provided in an embodiment of the present invention can using with play live content player in,
Its structural schematic diagram is as shown in fig. 6, specifically include:
4th acquiring unit 601, for obtaining and the live play when receiving live play triggering command every time
The corresponding live information of triggering command, and determine segment to be broadcast live corresponding with the live information;
First transmission unit 602, for sending key request to pre-set authentication management server, and described in reception
The current key group that authentication management server is fed back according to the key request determines corresponding with the current key group current
Key version number;
First detection unit 603 whether there is live streaming corresponding with the segment to be broadcast live for detecting the player
Address;
Second transmission unit 604, for live streaming address corresponding with the segment to be broadcast live to be not present when the player
When, to pre-set scheduler dispatches Address requests corresponding with the segment to be broadcast live;
Setting unit 605, for working as the current live address for receiving the scheduler and feeding back according to the Address requests
When, the address aging time corresponding with the current live address is set;
First resolution unit 606 obtains live streaming corresponding with the live information for parsing the current live address
Filename;
Generation unit 607 is used for according to the address aging time, current key group, live information and live file name,
Target authentication code is generated, and the target authentication code, address aging time and current key version number are encapsulated to described current
It is broadcast live in address, obtains target and address is broadcast live;
Third transmission unit 608 carries the target live streaming address and institute for sending to pre-set fringe node
The live streaming fragment request for stating live information triggers the fringe node according to the live information and target live streaming address
In target authentication code, address aging time, live file name and current key version number carry out antitheft certification;
Second resolution unit 609, for corresponding with the live streaming fragment request when receiving the fringe node feedback
When current slice data, determine the fringe node by the target authentication code, address aging time, live file name and working as
The antitheft certification of preceding key version number, and the current slice data are parsed, obtain work as corresponding with the current slice data
Preceding live streaming segment;
Second detection unit 610, for the current live segment to be played out on the pre-set display page,
And in the playing process of the currently playing segment, the current slice data are detected with the presence or absence of target timeslicing parameters, institute
State the timeslicing parameters that target timeslicing parameters are next fragment data;
Execution unit 611, if including the target timeslicing parameters for the current slice data, it is determined that described current
Fragment data is live play triggering command, and the live streaming letter of next segment to be broadcast live is generated according to the target timeslicing parameters
Breath executes the player every time to the process of fringe node request live streaming segment to be played;
End unit 612, if not including the target timeslicing parameters for the current slice data, described in completion
When the broadcasting of current live segment, terminate live play process.
The 4th acquiring unit 601, the first transmission unit 602 in the above antitheft chain apparatus disclosed by the embodiments of the present invention,
First detection unit 603, the second transmission unit 604, setting unit 605, the first resolution unit 606, generation unit 607, second
Transmission unit 608, the second resolution unit 609, second detection unit 610, the specific work of execution unit 611 and end unit 612
Make process, reference can be made to the corresponding content in the disclosed anti-stealing link method applied to player of the above embodiment of the present invention, here
No longer repeated.
The present invention also provides a kind of anti-stealing link system, system module figure is as shown in fig. 7, specifically include:
Fringe node 701, player 702, live streaming source station 703, scheduler 704 and authentication management server 705;
The fringe node 701, the live stream sent for receiving the live streaming source station, and according in the live stream
Burst information, by the live streaming flow fragmentation at multiple fragment datas;When the player sends live streaming fragment request, execute such as
The method of above-mentioned steps S101~S109;
The player 702, for every time receive live play triggering command when, execute as above-mentioned steps S501~
The method of S512;
The live streaming source station 703, for for the burst information corresponding with every live stream all the way of the insertion per live stream all the way, and
The live stream for being inserted into burst information is sent to the fringe node;
The scheduler 704, for being described broadcast according to the Address requests when receiving the Address requests of player
Put device feedback live streaming address;
The authentication management server 705, for generating new key group in real time, by pre-set api interface with
The fringe node and player connection, so that the fringe node and the player are obtained by the api interface
Key group.
The embodiment of the present invention is provided in anti-stealing link system, obtains live streaming address and authentication pipe according to from scheduler by player
After managing server acquisition current key group, according to the address aging time in the live streaming address, live file name, current key group
Corresponding current key version number generates target authentication code, and target authentication code, address aging time are encapsulated into live streaming address,
So that fringe node carries out antitheft certification in the live streaming fragment request for receiving player.Wherein, when fringe node is receiving
When the live streaming fragment request sent to player, live stream is obtained from live streaming source station, it is right and according to the burst information in live stream
The live stream carries out fragment processing, obtains each fragment data.Since live streaming is real-time perfoming, the fringe node side
Live stream, the processing of Bian Jinhang fragment are obtained, while also sending fragment data to player, until the last one fragment data knot
Beam.
Using the system of the invention that example provides in real time, burst information, fringe node are inserted into live stream by source station is broadcast live
Fragment processing is then carried out according to the burst information.Player carries out a series of encryption, and fringe node carries out antitheft recognizing again
Card, guarantee when obtaining live streaming segment, effectively discern whether to pass through there are illegal user and steal chain acquisition live content, in turn every time
Play the role of door chain.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system or
For system embodiment, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to method
The part of embodiment illustrates.System and system embodiment described above is only schematical, wherein the conduct
The unit of separate part description may or may not be physically separated, component shown as a unit can be or
Person may not be physical unit, it can and it is in one place, or may be distributed over multiple network units.It can root
According to actual need that some or all of the modules therein is selected to achieve the purpose of the solution of this embodiment.Ordinary skill
Personnel can understand and implement without creative efforts.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, it can be realized with electronic hardware, computer software, or a combination of the two.
In order to clearly illustrate the interchangeability of hardware and software, it is generally retouched according to function in the above description
Each exemplary composition and step are stated.These functions are implemented in hardware or software actually, depending on technical solution
Specific application and design constraint.Professional technician can to each specific application come using distinct methods to realize
The function of description, but such implementation should not be considered as beyond the scope of the present invention.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention.
Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention
It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one
The widest scope of cause.
Claims (13)
1. a kind of anti-stealing link method, which is characterized in that the method is applied to fringe node, which comprises
When receiving the live streaming fragment request of player transmission, piece to be broadcast live corresponding with the live streaming fragment request is determined
Section, and obtain the live information for including in the live streaming fragment request and target live streaming address;
Whether judge in the live information comprising timeslicing parameters corresponding with the live streaming fragment request;
If in the live information including timeslicing parameters corresponding with the live streaming fragment request, it is determined that the player is not
The live streaming fragment request corresponding with target live streaming address sent for the first time to the fringe node, and it is straight to obtain the target
Broadcast the target authentication code for including in address, address aging time, target cipher key version number and live file name;
According to the timeslicing parameters, target authentication code, address aging time, target cipher key version number and live file name, to institute
It states target live streaming address and carries out antitheft certification;
When the antitheft certification by the target being broadcast live address, fragment number entrained in the timeslicing parameters is obtained;
The current slice data to match with the fragment number are obtained, the current slice data are that the fringe node is read in real time
The live stream in pre-set live streaming source station is taken, and according to burst information entrained in the live stream, by the live streaming
Stream carries out the fragment data obtained after fragment, and the live stream is the corresponding live stream of the segment to be broadcast live;
Based on the fragment number, judge the current slice data whether be the live stream the last one fragment data;
If the current slice data are not the last one fragment data of the live stream, in the current slice data
Target timeslicing parameters are embedded in, and the current slice data for carrying target timeslicing parameters are sent to the player, described in triggering
Player plays current live segment corresponding with the current slice data, and according to the target timeslicing parameters to the side
Edge node sends live streaming fragment request corresponding with next live streaming segment, and the target timeslicing parameters are point of next fragment data
Piece parameter;
If the current slice data are the last one fragment data of the live stream, work as to described in player transmission
Preceding fragment data triggers player plays current live segment corresponding with the current slice data, so that described broadcast
Device is put after completing to play the current live segment, terminates live play.
2. the method according to claim 1, wherein described according to the timeslicing parameters, target authentication code, address
Expired time, target cipher key version number and live file name carry out antitheft certification to target live streaming address, comprising:
It determines request time corresponding with the live streaming fragment request, and judges whether the request time exceeds the address mistake
Time phase;
If the request time without departing from the address aging time, is sent to pre-set authentication management server and institute
State the corresponding secret key request message of target cipher key version number;
It is being fed back according to the secret key request message with the target cipher key version number when receiving the authentication management server
When corresponding target cipher key group, according to the fragment number in the live file name and the timeslicing parameters, the determining and target
The corresponding target encryption method of key group;
Using the target encryption method, to the target cipher key version number, fragment number, live file name and address aging time
It is encrypted, generates current authentication code;
The target authentication code is matched with the current authentication code, judges the target authentication code and the current authentication
Whether code is consistent;
If the target authentication code is consistent with the current authentication code, by the antitheft certification for the target being broadcast live address.
3. the method according to claim 1, wherein further include:
If not including timeslicing parameters corresponding with the live streaming fragment request in the live information, it is determined that the player is first
Secondary live streaming fragment request corresponding with target live streaming address being sent to the fringe node;
Parse target live streaming address, obtain the target authentication code for including in target live streaming address, the address aging time,
Target cipher key version number and live file name;
According to the target authentication code, address aging time, target cipher key version number and live file name, the target is broadcast live
Address carries out antitheft certification;
When by the target be broadcast live address antitheft certification when, read in real time in pre-set live streaming source station with it is described to
The corresponding live stream of segment, and live streaming picture group GOP data corresponding with the live stream is broadcast live;
The GOP data are sent to the player, trigger the player according to the GOP data playback and the live streaming
Flow corresponding live streaming picture;
The burst information for including in the live stream is obtained, and the live stream is carried out at fragment according to the burst information
Reason, obtains multiple fragment datas;
By each fragment data according to playing sequence corresponding with the live stream carry out label, and by label and take
First fragment data with next timeslicing parameters is sent to the player, triggers the player to first fragment
Data are parsed, and are obtained current live segment and are broadcast live broadcasting, and described in requesting again according to next timeslicing parameters
Fringe node obtains next fragment data.
4. method according to claim 1 or 3, which is characterized in that further include:
The quantity of generated each fragment data corresponding with the live stream in fringe node described in real-time detection;
When the quantity of each timeslicing parameters corresponding with the live stream in the fringe node is more than pre-set storage number
When amount, time earliest fragment data will be generated and deleted, so that fragment number corresponding with the live stream in the fringe node
According to quantity be no more than the storage quantity.
5. the method according to claim 1, wherein further include:
When the antitheft certification not by the target being broadcast live address, interrupts and sent and the fragment number pair to the player
The fragment data answered.
6. a kind of antitheft chain apparatus characterized by comprising
First acquisition unit, for when receiving the live streaming fragment request of player transmission, determination to be asked with the live streaming segment
Corresponding segment to be broadcast live is sought, and obtains the live information for including in the live streaming fragment request and target live streaming address;
First judging unit, for whether judging in the live information comprising fragment corresponding with live streaming fragment request ginseng
Number;
First determination unit, if for including timeslicing parameters corresponding with the live streaming fragment request in the live information,
Determine that the player is not that the live streaming segment corresponding with target live streaming address sent for the first time to the fringe node is asked
It asks, and obtains target authentication code, address aging time, target cipher key version number and the live streaming for including in target live streaming address
Filename;
Authentication unit, for according to the timeslicing parameters, target authentication code, address aging time, target cipher key version number and straight
Filename is broadcast, antitheft certification is carried out to target live streaming address;
Second acquisition unit, for obtaining in the timeslicing parameters when the antitheft certification by the target being broadcast live address
Entrained fragment number;
Third acquiring unit, for obtaining the current slice data to match with the fragment number, the current slice data are
The fringe node reads the live stream in pre-set live streaming source station in real time, and according to point entrained in the live stream
The live stream, is carried out the fragment data obtained after fragment by piece information, and the live stream is that the segment to be broadcast live is corresponding
Live stream;
Second judgment unit, for be based on the fragment number, judge the current slice data whether be the live stream most
The latter fragment data;
First trigger unit, if for the current slice data not being the last one fragment data of the live stream,
It is embedded in target timeslicing parameters in the current slice data, and the current slice data for carrying target timeslicing parameters are sent to institute
Player is stated, triggers player plays current live segment corresponding with the current slice data, and according to the mesh
It marks timeslicing parameters and sends live streaming fragment request corresponding with next live streaming segment, the target timeslicing parameters to the fringe node
For the timeslicing parameters of next fragment data;
Second trigger unit, if being the last one fragment data of the live stream for the current slice data, to institute
It states player and sends the current slice data, it is corresponding with the current slice data current straight to trigger the player plays
Segment is broadcast, so that the player after completing to play the current live segment, terminates live play.
7. a kind of anti-stealing link method, which is characterized in that the method is applied to player, which comprises
When receiving live play triggering command every time, live information corresponding with the live play triggering command is obtained,
And determine segment to be broadcast live corresponding with the live information;
Key request is sent to pre-set authentication management server, and receives the authentication management server according to described close
The current key group of key request feedback, determines current key version number corresponding with the current key group;
Detecting the player whether there is live streaming address corresponding with the segment to be broadcast live;
When the player is not present with described when segment corresponding live streaming address is broadcast live, to pre-set scheduler dispatches
Address requests corresponding with the segment to be broadcast live;
When receiving the current live address that the scheduler is fed back according to the Address requests, setting and the current live
The address corresponding address aging time;
The current live address is parsed, live file name corresponding with the live information is obtained;
According to the address aging time, current key group, live information and live file name, target authentication code is generated, and will
The target authentication code, address aging time and current key version number encapsulate into the current live address, obtain target
Address is broadcast live;
The live streaming fragment request for carrying the target live streaming address and the live information is sent to pre-set fringe node,
When triggering target authentication code, the address aging that the fringe node is broadcast live in address according to the live information and the target
Between, live file name and current key version number carry out antitheft certification;
When receiving the current slice data corresponding with the live streaming fragment request of the fringe node feedback, the side is determined
Edge node by the target authentication code, address aging time, live file name and the antitheft certification of current key version number,
And the current slice data are parsed, obtain current live segment corresponding with the current slice data;
The current live segment is played out on the pre-set display page, and broadcasting in the currently playing segment
During putting, the current slice data are detected with the presence or absence of target timeslicing parameters, the target timeslicing parameters are next fragment
The timeslicing parameters of data;
If the current slice data include the target timeslicing parameters, it is determined that the current slice data are live play touching
Send instructions, and generate the live information of next segment to be broadcast live according to the target timeslicing parameters, it is every to execute the player
The secondary process to fringe node request live streaming segment to be played;
If the current slice data do not include the target timeslicing parameters, in the broadcasting for completing the current live segment
When, terminate live play process.
8. the method according to the description of claim 7 is characterized in that it is described according to the address aging time, current key group,
Live information and live file name generate target authentication code, comprising:
It whether detects in the live information comprising timeslicing parameters corresponding with the segment to be broadcast live;
When not including in the live information with described when segment corresponding timeslicing parameters are broadcast live, according to the live file name
Generate encryption method corresponding with the current key group;
The live file name, key group version number and address aging time are encrypted using the encryption method, generated
Target authentication code.
9. according to the method described in claim 8, it is characterized in that, receiving fringe node feedback with the live streaming piece
Before section requests corresponding current slice data, further includes:
The fringe node is received by returning to live streaming picture group corresponding with the segment to be broadcast live after the antitheft certification
GOP data;
The GOP data are parsed, live streaming picture corresponding with the GOP data is played, and receive the fringe node according to institute
State the fragment data of live information return.
10. according to the method described in claim 8, it is characterized by further comprising:
When in the live information comprising obtaining the timeslicing parameters when segment corresponding timeslicing parameters are broadcast live with described, and
Parse the fragment number that the timeslicing parameters obtain fragment data to be obtained;
According to the live file name and the fragment number, the determining current encryption method with the current key group;
Using the current encryption method, to the live file name, key group version number, fragment number and address aging time into
Row encryption, generates target authentication code.
11. the method according to the description of claim 7 is characterized in that the detection current slice data whether there is mesh
Mark timeslicing parameters, comprising:
The each piecemeal field for including in the fragment data is obtained, and in the playing process of the current live segment, according to
The secondary each piecemeal field of parsing;
When parsing to target segment field, detects and whether carried in the target segment field and the target timeslicing parameters pair
The fragment number answered, the target segment field are the penultimate piecemeal field in each piecemeal field;
If carrying fragment number corresponding with the target timeslicing parameters in the target segment field, it is determined that the current slice
There are the target timeslicing parameters for data;
If fragment number corresponding with the target timeslicing parameters is not carried in the target segment field, it is determined that described current point
The target timeslicing parameters are not present in sheet data.
12. a kind of antitheft chain apparatus characterized by comprising
4th acquiring unit refers to for obtaining when receiving live play triggering command every time with live play triggering
Corresponding live information is enabled, and determines segment to be broadcast live corresponding with the live information;
First transmission unit for sending key request to pre-set authentication management server, and receives the authentication pipe
The current key group that reason server is fed back according to the key request, determines current key version corresponding with the current key group
This number;
First detection unit whether there is live streaming address corresponding with the segment to be broadcast live for detecting the player;
Second transmission unit, for being not present with described when segment corresponding live streaming address is broadcast live when the player, to pre-
The scheduler dispatches being first arranged Address requests corresponding with the segment to be broadcast live;
Setting unit, for being arranged when receiving the current live address that the scheduler is fed back according to the Address requests
The address aging time corresponding with the current live address;
First resolution unit obtains live file name corresponding with the live information for parsing the current live address;
Generation unit, for generating mesh according to the address aging time, current key group, live information and live file name
Authentication code is marked, and the target authentication code, address aging time and current key version number are encapsulated to the current live
In location, obtains target and address is broadcast live;
Third transmission unit carries the target live streaming address and live streaming letter for sending to pre-set fringe node
The live streaming fragment request of breath triggers the fringe node according to the target in the live information and target live streaming address
Authentication code, address aging time, live file name and current key version number carry out antitheft certification;
Second resolution unit receives fringe node feedback current slice corresponding with the live streaming fragment request for working as
When data, determine that the fringe node passes through to the target authentication code, address aging time, live file name and current key version
This number antitheft certification, and the current slice data are parsed, obtain current live piece corresponding with the current slice data
Section;
Second detection unit, for playing out the current live segment on the pre-set display page, and in institute
In the playing process for stating currently playing segment, the current slice data are detected with the presence or absence of target timeslicing parameters, the target
Timeslicing parameters are the timeslicing parameters of next fragment data;
Execution unit, if including the target timeslicing parameters for the current slice data, it is determined that the current slice number
According to for live play triggering command, and the live information of next segment to be broadcast live is generated according to the target timeslicing parameters, held
The row player is every time to the process of fringe node request live streaming segment to be played;
End unit is described current straight in completion if not including the target timeslicing parameters for the current slice data
When broadcasting the broadcasting of segment, terminate live play process.
13. a kind of anti-stealing link system characterized by comprising
Fringe node, player, live streaming source station, scheduler and authentication management server;
The fringe node, the live stream sent for receiving the live streaming source station, and according to the fragment letter in the live stream
Breath, by the live streaming flow fragmentation at multiple fragment datas;When the player sends live streaming fragment request, such as above-mentioned power is executed
Benefit require 1~5 described in method;
The player, for executing as described in the claims 7~11 when receiving live play triggering command every time
Method;
The live streaming source station for being every insertion of live stream all the way and the corresponding burst information per live stream all the way, and will insert
The live stream for entering burst information is sent to the fringe node;
The scheduler, for being that the player is anti-according to the Address requests when receiving the Address requests of player
Feedback live streaming address;
The authentication management server passes through pre-set api interface and the edge for generating new key group in real time
Node and player connection, so that the fringe node and the player obtain key group by the api interface.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910823357.2A CN110381334B (en) | 2019-09-02 | 2019-09-02 | Anti-stealing-link method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910823357.2A CN110381334B (en) | 2019-09-02 | 2019-09-02 | Anti-stealing-link method, device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110381334A true CN110381334A (en) | 2019-10-25 |
CN110381334B CN110381334B (en) | 2021-05-28 |
Family
ID=68261448
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910823357.2A Active CN110381334B (en) | 2019-09-02 | 2019-09-02 | Anti-stealing-link method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110381334B (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111787342A (en) * | 2020-06-22 | 2020-10-16 | 亦非云互联网技术(上海)有限公司 | Streaming media live broadcast viewing method, system, medium and device |
CN112689164A (en) * | 2020-12-17 | 2021-04-20 | 杭州当虹科技股份有限公司 | CDN-based video anti-theft chain system |
CN112953724A (en) * | 2021-02-22 | 2021-06-11 | 广州虎牙科技有限公司 | Authentication method of anti-theft chain, and related device and equipment |
CN114679601A (en) * | 2022-03-29 | 2022-06-28 | 湖南快乐阳光互动娱乐传媒有限公司 | Signal plug flow method and device |
CN115459989A (en) * | 2022-09-02 | 2022-12-09 | 京东科技信息技术有限公司 | Data access method and device |
Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007076685A1 (en) * | 2005-12-31 | 2007-07-12 | Zte Corporation | A method for extending the url applicable to the streaming media system |
US20100180082A1 (en) * | 2009-01-12 | 2010-07-15 | Viasat, Inc. | Methods and systems for implementing url masking |
TW201322044A (en) * | 2011-11-28 | 2013-06-01 | Prospect Telecomm Technology Co Ltd | Anti-theft linking system and archives download method thereof |
US20140229544A1 (en) * | 2013-02-12 | 2014-08-14 | BackPeddle, LLC | Sharing content in social networks |
CN104284213A (en) * | 2014-09-26 | 2015-01-14 | 深圳市同洲电子股份有限公司 | Hotlink protection method, client side and system |
CN104320377A (en) * | 2014-09-25 | 2015-01-28 | 华为技术有限公司 | An anti-stealing-link method and device for stream media file |
CN104811773A (en) * | 2015-04-28 | 2015-07-29 | 天脉聚源(北京)传媒科技有限公司 | Hotlinking prevention-based channel playing implementation method, system and equipment |
CN104853243A (en) * | 2015-05-13 | 2015-08-19 | 上海玮舟微电子科技有限公司 | Transport stream de-multiplexing method and apparatus |
CN106936770A (en) * | 2015-12-30 | 2017-07-07 | 玲珑视界科技(北京)有限公司 | A kind of HLS index lists encrypted antitheft catenary system and method |
CN107222480A (en) * | 2017-05-27 | 2017-09-29 | 中国联合网络通信集团有限公司 | A kind of flow media playing method, terminal device and CDN server |
CN107707504A (en) * | 2016-08-08 | 2018-02-16 | 中国电信股份有限公司 | A kind of player method of Streaming Media, system and server and client side |
CN108924595A (en) * | 2018-08-15 | 2018-11-30 | 广东南方新媒体股份有限公司 | Realize the method and system of TS slice door chain |
CN109743586A (en) * | 2018-12-28 | 2019-05-10 | 广州华多网络科技有限公司 | Live streaming media anti-stealing link method and system |
CN109996095A (en) * | 2019-03-28 | 2019-07-09 | 湖南快乐阳光互动娱乐传媒有限公司 | Method, system and medium for preventing stealing link playing in network video on demand |
-
2019
- 2019-09-02 CN CN201910823357.2A patent/CN110381334B/en active Active
Patent Citations (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2007076685A1 (en) * | 2005-12-31 | 2007-07-12 | Zte Corporation | A method for extending the url applicable to the streaming media system |
US20100180082A1 (en) * | 2009-01-12 | 2010-07-15 | Viasat, Inc. | Methods and systems for implementing url masking |
TW201322044A (en) * | 2011-11-28 | 2013-06-01 | Prospect Telecomm Technology Co Ltd | Anti-theft linking system and archives download method thereof |
US20140229544A1 (en) * | 2013-02-12 | 2014-08-14 | BackPeddle, LLC | Sharing content in social networks |
CN104320377A (en) * | 2014-09-25 | 2015-01-28 | 华为技术有限公司 | An anti-stealing-link method and device for stream media file |
CN104284213A (en) * | 2014-09-26 | 2015-01-14 | 深圳市同洲电子股份有限公司 | Hotlink protection method, client side and system |
CN104811773A (en) * | 2015-04-28 | 2015-07-29 | 天脉聚源(北京)传媒科技有限公司 | Hotlinking prevention-based channel playing implementation method, system and equipment |
CN104853243A (en) * | 2015-05-13 | 2015-08-19 | 上海玮舟微电子科技有限公司 | Transport stream de-multiplexing method and apparatus |
CN106936770A (en) * | 2015-12-30 | 2017-07-07 | 玲珑视界科技(北京)有限公司 | A kind of HLS index lists encrypted antitheft catenary system and method |
CN107707504A (en) * | 2016-08-08 | 2018-02-16 | 中国电信股份有限公司 | A kind of player method of Streaming Media, system and server and client side |
CN107222480A (en) * | 2017-05-27 | 2017-09-29 | 中国联合网络通信集团有限公司 | A kind of flow media playing method, terminal device and CDN server |
CN108924595A (en) * | 2018-08-15 | 2018-11-30 | 广东南方新媒体股份有限公司 | Realize the method and system of TS slice door chain |
CN109743586A (en) * | 2018-12-28 | 2019-05-10 | 广州华多网络科技有限公司 | Live streaming media anti-stealing link method and system |
CN109996095A (en) * | 2019-03-28 | 2019-07-09 | 湖南快乐阳光互动娱乐传媒有限公司 | Method, system and medium for preventing stealing link playing in network video on demand |
Non-Patent Citations (2)
Title |
---|
李吉广等: ""IPTV视频硬件加密传输***的设计"", 《电视技术》 * |
高志恒等: ""互联网电视直播软件原理分析"", 《第2 2 届中国数字广播电视与网络发展年会暨第1 3 届全国互联网与音视频广播发展研讨会》 * |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111787342A (en) * | 2020-06-22 | 2020-10-16 | 亦非云互联网技术(上海)有限公司 | Streaming media live broadcast viewing method, system, medium and device |
CN112689164A (en) * | 2020-12-17 | 2021-04-20 | 杭州当虹科技股份有限公司 | CDN-based video anti-theft chain system |
CN112689164B (en) * | 2020-12-17 | 2022-06-28 | 杭州当虹科技股份有限公司 | CDN-based video anti-theft chain system |
CN112953724A (en) * | 2021-02-22 | 2021-06-11 | 广州虎牙科技有限公司 | Authentication method of anti-theft chain, and related device and equipment |
CN114679601A (en) * | 2022-03-29 | 2022-06-28 | 湖南快乐阳光互动娱乐传媒有限公司 | Signal plug flow method and device |
CN115459989A (en) * | 2022-09-02 | 2022-12-09 | 京东科技信息技术有限公司 | Data access method and device |
Also Published As
Publication number | Publication date |
---|---|
CN110381334B (en) | 2021-05-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110381334A (en) | Anti-stealing-link method, device and system | |
CN103620609B (en) | DRM(digital rights management is utilized for playing) method of digital content of scheme protection and corresponding system | |
CN103649962B (en) | System and method for protecting digital contents with digital rights management (DRM) | |
EP3055805B1 (en) | System and method for signaling and verifying url signatures for both url authentication and url-based content access authorization in adaptive streaming | |
WO2018177110A1 (en) | Media content licensing method and device | |
US9648027B2 (en) | Segment authentication for dynamic adaptive streaming | |
US7698554B2 (en) | Controlling transmission of broadcast content | |
US6571344B1 (en) | Method and apparatus for authenticating time-sensitive interactive communications | |
US9032497B2 (en) | System and method for securing embedded media | |
US9185094B2 (en) | Systems, methods and apparatuses for the secure transmission and restricted use of media content | |
CN101075866B (en) | Method and system for loading message on Internet | |
CN105409226A (en) | System and method for effectively controlling client behavior in adaptive streaming | |
CN104811773A (en) | Hotlinking prevention-based channel playing implementation method, system and equipment | |
EP2974287A2 (en) | Advertising download verification | |
KR101407373B1 (en) | Method of implementing a state tracking mechanism in a communications session between a server and a client system | |
US8495154B2 (en) | Content usage tracking in superdistribution | |
CN109905731A (en) | Video file downloading anti-stealing link method, system and medium capable of preventing pass from being stolen | |
CN111932317A (en) | Block chain based advertisement playing method, device, medium and electronic equipment | |
KR20080029596A (en) | System for broadcasting in personal ip broadcasting system by applying personal drm and method using the same | |
US20050076183A1 (en) | Method and apparatus for enforcing timed agreements | |
CN115514991B (en) | IPTV video tamper-proof method, server and client | |
CN105847885B (en) | A kind of white list generation system and method based on video render state | |
Lee et al. | A DRM framework for secure distribution of mobile contents | |
CN101166293A (en) | Method for opening mobile union to exchange multimedia information |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |