CN114466215B - Data processing method and device - Google Patents

Data processing method and device Download PDF

Info

Publication number
CN114466215B
CN114466215B CN202210124070.2A CN202210124070A CN114466215B CN 114466215 B CN114466215 B CN 114466215B CN 202210124070 A CN202210124070 A CN 202210124070A CN 114466215 B CN114466215 B CN 114466215B
Authority
CN
China
Prior art keywords
target
user identifier
encrypted
identifier
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210124070.2A
Other languages
Chinese (zh)
Other versions
CN114466215A (en
Inventor
孙袁袁
周威
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Bilibili Technology Co Ltd
Original Assignee
Shanghai Bilibili Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Bilibili Technology Co Ltd filed Critical Shanghai Bilibili Technology Co Ltd
Priority to CN202210124070.2A priority Critical patent/CN114466215B/en
Publication of CN114466215A publication Critical patent/CN114466215A/en
Priority to PCT/CN2022/143525 priority patent/WO2023151415A1/en
Application granted granted Critical
Publication of CN114466215B publication Critical patent/CN114466215B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/235Processing of additional data, e.g. scrambling of additional data or processing content descriptors
    • H04N21/2351Processing of additional data, e.g. scrambling of additional data or processing content descriptors involving encryption of additional data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2187Live feed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26613Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing keys in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44204Monitoring of content usage, e.g. the number of times a movie has been viewed, copied or the amount which has been watched
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/462Content or additional data management, e.g. creating a master electronic program guide from data received from the Internet and a Head-end, controlling the complexity of a video stream by scaling the resolution or bit-rate based on the client capabilities
    • H04N21/4627Rights management associated to the content
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Two-Way Televisions, Distribution Of Moving Picture Or The Like (AREA)

Abstract

The application provides a data processing method and a device, wherein the data processing method comprises the following steps: receiving target heartbeat data, wherein the target heartbeat data comprises a user identifier to be verified and a target play address carrying an encrypted user identifier; encrypting the user identifier to be verified based on a preset encryption algorithm to obtain an encrypted identifier to be verified; comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result; and determining attribute information of the target heartbeat data based on the comparison result. By determining the attribute information of the target heartbeat data, whether the target heartbeat data is valid or not can be determined based on the attribute information later.

Description

Data processing method and device
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data processing method. The present application is directed to data processing apparatus, data processing system, a computing device, and a computer readable storage medium.
Background
With the continuous development of live broadcast technology, more and more users will watch live broadcast as an entertainment mode; in the existing live broadcast system, popularity (namely the number of viewers in the live broadcast room) is an important index for ranking the live broadcast room of the live broadcast platform; in general, the higher the popularity, the more likely the anchor is to be viewed by the user. However, the problem of live broadcast watching number brushing amount exists at present, namely, illegal users randomly generate virtual heartbeat data to increase watching number of live broadcast rooms, and ecology of a live broadcast platform is affected.
In order to solve the problems, a user identity field is usually added when heartbeat data is generated, so that the authenticity of the heartbeat data is ensured; however, the method is easy to crack, and an illegal user can randomly acquire a real user identity field to generate heartbeat data; if the authenticity of the user identity field in each piece of heartbeat data is verified, a larger query pressure is easily brought to the server, so that the server is blocked, and the watching experience of a user is further affected.
Therefore, how to improve the authenticity of the heartbeat data under the condition of ensuring the user experience is a technical problem to be solved urgently by the person skilled in the art.
Disclosure of Invention
In view of this, embodiments of the present application provide a data processing method. The application relates to a data processing device, a computing device and a computer readable storage medium simultaneously, so as to solve the problem that the reality of the number of people watched in a live broadcasting room is low and the ecology of a live broadcasting platform is influenced in the prior art.
According to a first aspect of embodiments of the present application, there is provided a data processing method, applied to a heartbeat server, including:
receiving target heartbeat data, wherein the target heartbeat data comprises a user identifier to be verified and a target play address carrying an encrypted user identifier;
Encrypting the user identifier to be verified based on a preset encryption algorithm to obtain an encrypted identifier to be verified;
comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result;
and determining attribute information of the target heartbeat data based on the comparison result.
According to a second aspect of embodiments of the present application, there is provided another data processing method, applied to a scheduling server, including:
receiving a play address acquisition request, wherein the play address acquisition request comprises a target user identifier;
encrypting the target user identifier based on a preset encryption algorithm to obtain an encrypted user identifier;
and acquiring a play address corresponding to the target user identifier, generating a target play address based on the encrypted user identifier and the play address, and sending the target play address to a target client.
According to a third aspect of embodiments of the present application, there is provided a data processing apparatus comprising:
the first receiving module is configured to receive target heartbeat data, wherein the target heartbeat data comprises a user identifier to be verified and a target playing address carrying an encrypted user identifier;
The first encryption module is configured to encrypt the user identifier to be verified based on a preset encryption algorithm to obtain an encrypted identifier to be verified;
the comparison module is configured to compare the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result;
and the determining module is configured to determine attribute information of the target heartbeat data based on the comparison result.
According to a fourth aspect of embodiments of the present application, there is provided another data processing apparatus, comprising:
the second receiving module is configured to receive a play address acquisition request, wherein the play address acquisition request comprises a target user identifier;
the second encryption module is configured to encrypt the target user identifier based on a preset encryption algorithm to obtain an encrypted user identifier;
the generation module is configured to acquire a play address corresponding to the target user identifier, generate a target play address based on the encrypted user identifier and the play address, and send the target play address to a target client.
According to a fifth aspect of embodiments of the present application, there is provided a data processing system, comprising a heartbeat server, a scheduling server, and a target client, wherein:
The target client is configured to acquire a target user identifier, generate a play address acquisition request based on the target user identifier, and send the play address acquisition request to the scheduling server;
the scheduling server is configured to receive the play address acquisition request, wherein the play address acquisition request contains the target user identifier; encrypting the target user identifier based on a preset encryption algorithm to obtain an encrypted user identifier; acquiring a play address corresponding to the target user identifier, generating a target play address based on the play address and the encrypted user identifier, and transmitting the target play address to the target client;
the target client is further configured to receive the target play address, where the target play address includes the encrypted user identifier; generating target heartbeat data based on the user identification to be verified and the target play address, and sending the target heartbeat data to the heartbeat server;
the heartbeat server is configured to receive the target heartbeat data, wherein the target heartbeat data comprises the user identifier to be verified and a target play address carrying the encrypted user identifier; encrypting the user identifier to be verified based on the preset encryption algorithm to obtain an encrypted identifier to be verified; comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result; and determining attribute information of the target heartbeat data based on the comparison result.
According to a sixth aspect of embodiments of the present application, there is provided a computing device comprising a memory, a processor and computer instructions stored on the memory and executable on the processor, the processor implementing the steps of the data processing method when executing the computer instructions.
According to a seventh aspect of the embodiments of the present application, there is provided a computer readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the data processing method.
The data processing method provided by the application receives target heartbeat data, wherein the target heartbeat data comprises a user identifier to be verified and a target play address carrying an encrypted user identifier; encrypting the user identifier to be verified based on a preset encryption algorithm to obtain an encrypted identifier to be verified; comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result; and determining attribute information of the target heartbeat data based on the comparison result.
According to the embodiment of the application, the target heartbeat data comprising the user identifier to be verified and the target play address carrying the encrypted user identifier is received, so that the user identifier to be verified is encrypted based on a preset encryption algorithm, and the encrypted identifier to be verified is obtained; and comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result, so as to determine whether the user identifier to be verified is consistent with the user identifier in the play address, namely, whether the user identifier to be verified is obtained randomly by an illegal user, and further, the validity of the target heartbeat data is determined conveniently.
Drawings
FIG. 1 is a flow chart of a data processing method according to an embodiment of the present application;
FIG. 2 is a flow chart of another data processing method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a process flow of a data processing method for counting the number of viewers in a live broadcast room A according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a data processing system according to an embodiment of the present application;
FIG. 5 is a schematic diagram of a data processing apparatus according to an embodiment of the present application;
FIG. 6 is a schematic diagram of another data processing apparatus according to an embodiment of the present application;
FIG. 7 is a block diagram of a computing device according to one embodiment of the present application.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is, however, susceptible of embodiment in many other ways than those herein described and similar generalizations can be made by those skilled in the art without departing from the spirit of the application and the application is therefore not limited to the specific embodiments disclosed below.
The terminology used in one or more embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of one or more embodiments of the application. As used in this application in one or more embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present application refers to any or all possible combinations including one or more of the associated listed items.
It should be understood that, although the terms first, second, etc. may be used in one or more embodiments of the present application to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, a first may also be referred to as a second, and similarly, a second may also be referred to as a first, without departing from the scope of one or more embodiments of the present application. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
First, terms related to one or more embodiments of the present application will be explained.
Live stream: the transmission of the video-on-demand data can be transmitted as a steady and continuous stream over the network to the viewer for viewing.
Live broadcast plug flow: the anchor obtains the push address from the live broadcast cloud platform through the service server, and the collected streaming media is pushed to the live broadcast cloud receiving end in real time through the push address.
Live broadcast stream pulling: the pulling refers to a process of pulling the live stream from the live cloud platform to a source station designated by a user.
Live people: the real population of the live broadcast room is watched in real time.
Brush amount: by simulating normal user access, a large number of false viewing scenarios are created.
Heartbeat data: the data is data which is transmitted at regular intervals and is similar to a heartbeat, and is called heartbeat data, because the data is transmitted between the client and the server to inform the other party of the state of the data.
And the heartbeat server: the server receives heartbeat data sent by the client, and in a live broadcast scene, the heartbeat server can count the number of current viewers in a live broadcast room based on the received heartbeat data.
Brush amount: by simulating normal user access, a large number of false viewing situations are created, i.e. viewing the live room by illegal means.
In the current live scene, the specific process of generating heartbeat data may be: the client receives a live broadcasting room watching request sent by a user; generating a live broadcasting room playing address acquisition request based on the live broadcasting room watching request, sending the request to a scheduling server, and returning a playing address to a client by the scheduling server based on the playing address acquisition request; the client side periodically generates heartbeat data based on the play address and reports the heartbeat data to the heartbeat server; the heartbeat server may determine whether a transmission connection is established between the client and the server through the heartbeat data received at regular time, for example, whether the client is playing the content of the target live broadcast room, and the heartbeat server may count the number of users currently watching the target live broadcast room based on the received heartbeat data.
However, in addition to the method for generating heartbeat data, in order to increase the number of viewers in the live broadcasting room, some illegal users may further place the live broadcasting room in a front ranking, often intercept a play address returned to the client by the scheduling server, and generate virtual heartbeat data based on the intercepted play address, that is, increase the number of viewers in the live broadcasting room by adopting various ways of brushing. By adopting the method for increasing the number of watching persons in the live broadcasting room, the ecology of the live broadcasting platform is affected, so that the live broadcasting platform cannot determine the real number of watching persons in the live broadcasting room, and further cannot recommend the real high-quality live broadcasting room to the user for watching, and the experience of watching the live broadcasting room user is affected.
In order to solve the above problems, many live broadcast platforms are provided with UID (User Identification) fields added in heartbeat data when a client reports the heartbeat data to a heartbeat server, and whether the user is a login user is judged by judging whether the UID field exists or not; if the proportion of the unregistered users in the live broadcasting room in the total number of the watched users is higher, determining that the live broadcasting room possibly has a brushing amount behavior; however, the method is still easy to be cracked by an illegal user, namely, the illegal user randomly generates the UID and then generates heartbeat data based on the UID; if the authenticity of the UID in each heartbeat data is verified, the server inquires that the number of people watched in the live broadcasting room is large; and the illegal user can randomly crack the UID of the real user to generate heartbeat data corresponding to the observation of the illegal user.
Therefore, in the data processing method, when the client sends a play address acquisition request to the scheduling server, a user identity field of a user watching a live broadcast room is added in the play address acquisition request; after receiving the request for obtaining the play address, the scheduling server encrypts a user identity field in the play address; returning the live broadcast address containing the encrypted user identity field to the client; the client side generates heartbeat data based on a play address returned by the scheduling service and a corresponding user identity field at regular time and reports the heartbeat data to the heartbeat server; the heartbeat server encrypts the user identity field in the heartbeat data and compares the encrypted user identity field with the encrypted user field identifier in the play address, and under the condition that the comparison is inconsistent, the heartbeat data can be determined to be invalid heartbeat data generated by an illegal user, and the heartbeat data can be discarded when the heartbeat data are summarized by the heartbeat server.
In the present application, a data processing method is provided, and the present application relates to a data processing apparatus, a data processing system, a computing device, and a computer-readable storage medium, which are described in detail in the following embodiments one by one.
Fig. 1 shows a flowchart of a data processing method according to an embodiment of the present application, which is applied to a heartbeat server, and specifically includes the following steps:
step 102: target heartbeat data is received. The target heartbeat data comprises a user identifier to be verified and a target playing address carrying an encrypted user identifier.
In practical application, in order to recommend a high-quality live broadcast room to a user, the viewing experience of the user is improved, and the live broadcast room is usually ranked based on the number of viewers in the live broadcast room; the method for counting the number of viewers in the live broadcasting room is generally as follows: the client side reports heartbeat data to the heartbeat server at regular time, wherein the reported heartbeat data generally comprises a live broadcast room identifier of a live broadcast room watched by a user and a play address of the live broadcast room; after the heartbeat server receives the heartbeat data, the heartbeat data can be summarized based on the identifiers of the live broadcasting rooms, the number of the viewers of each live broadcasting room is calculated, and then the live broadcasting rooms can be ordered based on the number of the viewers.
The target heartbeat data refer to data for informing the opposite side of the current equipment state at regular time between the client and the server, and the continuously established transmission link between the client and the server can be determined by transmitting the heartbeat data to the heartbeat server at regular time; in this embodiment, the heartbeat data may be used to count the number of viewers in the live broadcasting room, that is, after the heartbeat server receives the heartbeat data, the heartbeat server may count the current number of viewers in the live broadcasting room based on the live broadcasting room identifier in the heartbeat data; in practical application, the target heartbeat data may be heartbeat data generated when a real user views a live broadcast room, i.e. the heartbeat data reported to the heartbeat server by the target client at regular time; for example, the audience a watches live broadcast based on the client A, the client acquires the play address of the target live broadcast room based on the live broadcast watching request of the user, and reports the heartbeat data to the heartbeat server according to the play address at regular time, so that the heartbeat server can determine that the current audience a watches the target live broadcast room;
The target heartbeat data can also be heartbeat data generated by an illegal user based on a real playing address or heartbeat data generated by other modes, specifically, the illegal user intercepts the playing address returned to the client and generates simulated heartbeat data based on the playing address, for example, when the illegal user intercepts the playing address of the client A where the audience a is located when watching the target live broadcast room, the scheduling server returns to the playing address of the client A where the audience a is located, and generates the simulated heartbeat data based on the playing address, namely, the heartbeat data is obtained by adopting a brushing amount mode, so that the number of people in the live broadcast room obtained when counting the number of people in the live broadcast room based on the heartbeat data is unreal; in order to prevent the occurrence of the above-mentioned brushing amount, verification of the authenticity of the heartbeat data is required to realize the brushing prevention.
In this embodiment, if the target heartbeat data is real heartbeat data, the target heartbeat data includes a user identifier to be verified and a target play address carrying an encrypted user identifier; if the target heartbeat data is simulated heartbeat data generated by an illegal user, the simulated heartbeat data may not contain the user identifier to be verified and/or the target play address carrying the encrypted user identifier, so after the heartbeat server receives the heartbeat data, whether the heartbeat data contains the user identifier to be verified or not can be judged first, and the heartbeat data can be determined to be the simulated heartbeat data under the condition of not containing the user identifier to be verified; however, if the illegal user breaks the data structure of the heartbeat data containing the user identification to be verified, a subsequent step is required to further judge the target heartbeat data.
Specifically, the user identifier to be verified refers to a user identity field for generating heartbeat data, for example, a user identity ID, a user number, and the like; the encrypted user identifier refers to a field or a character string obtained by encrypting the user identifier based on an encryption algorithm; the target play address refers to a play address which is returned by the dispatch server and carries the encrypted user identifier.
In practical application, the method for obtaining the target heartbeat data including the user identifier to be verified and the target play address carrying the encrypted user identifier may be:
the client receives the play request and generates a play address acquisition request based on the play request and a user identifier corresponding to the play request; sending a play address acquisition request to a dispatch server, calling a play address corresponding to the identifier of the live broadcasting room by the dispatch server, encrypting the user identifier to obtain an encrypted user identifier, adding the encrypted user identifier to the play address to obtain a target play address, and returning the target play address to the client; after receiving the target play address, the client generates target heartbeat data based on the user identifier to be verified corresponding to the target play address and sends the target heartbeat data to the heartbeat server.
It should be noted that, the above-mentioned method for obtaining the target heartbeat data is to watch the heartbeat data generated in the living broadcast room for the real user in the target heartbeat data, and the process of generating the target heartbeat data for the illegal user is not limited in this application. According to the method, the heartbeat server receives the target heartbeat data containing the target playing address carrying the encrypted user identification, so that the authenticity of the target heartbeat data is judged based on the encrypted user identification later, and the encrypted user identification is sent to the heartbeat server along with the target playing address, so that an illegal user is not easy to crack in the anti-brushing mode, and further the situation that the illegal user obtains the heartbeat data through the brushing amount and influences the authenticity of the heartbeat data is prevented.
In a specific embodiment of the present application, taking the heartbeat server B as an example, the heartbeat server B receives heartbeat data a, where the heartbeat data a includes a user ID "123" and a play address 1 including an encrypted character string.
The heartbeat server receives the target play address which is sent by the client and contains the user identification to be verified and the encrypted user identification, so that the effectiveness of target heartbeat data is conveniently judged based on the user identification to be verified and the target play address which is carried with the encrypted user identification, the number of people in the live broadcasting room is conveniently counted based on the effective heartbeat data, and the authenticity of the number of people in the live broadcasting room is improved.
Step 104: and encrypting the user identification to be verified based on a preset encryption algorithm to obtain the encrypted identification to be verified.
The preset encryption algorithm refers to an algorithm for encrypting the user identifier to be verified, for example, a Hash encryption algorithm, a DES encryption algorithm and the like, and the application is not particularly limited, and the algorithm for encrypting the user identifier to be verified can be realized; the encrypted identifier to be verified refers to a field or a character string obtained by encrypting the user identifier to be verified.
It should be noted that, in the present application, the encryption algorithm for obtaining the encrypted identifier to be verified and the encrypted user identifier may be the same encryption algorithm, for example, the encryption algorithm for obtaining the encrypted identifier to be verified and the encrypted user identifier is a Hash encryption algorithm; the same encryption algorithm is used, so that the encryption identification to be verified and the encryption user identification are convenient to compare in the follow-up process.
For example, resolving the target play address d to obtain a user identifier "qwe123456" to be verified in the target play address d; the user identification to be verified "qwe123456" is encrypted according to the MD5 encryption algorithm, and the encrypted identification to be verified "2569d419bfea999ff13fd1f7f4498b89" is obtained.
The user identification to be verified is encrypted based on a preset encryption algorithm, so that the encrypted identification to be verified is compared with the encrypted user identification in the target play address, and whether the heartbeat data are generated by watching live broadcast by a real user is determined.
Step 106: and comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result.
Specifically, after the identification to be encrypted and the encrypted user identification are determined, the identification to be encrypted and the encrypted user identification are matched based on a preset matching algorithm, such as a character string matching algorithm, and whether the identification to be encrypted and the encrypted user identification are consistent or not is judged; if the target heartbeat data are inconsistent, whether the target heartbeat data are generated by the illegal user randomly acquiring the user identification is indicated, namely, the target heartbeat data are invalid.
In practical application, the method for comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result comprises the following steps:
under the condition that the to-be-verified encrypted identifier is consistent with the encrypted user identifier, determining that the comparison result is successful;
and under the condition that the to-be-verified encrypted identifier is inconsistent with the encrypted user identifier in comparison, determining that the comparison result is failure in comparison.
Wherein, the successful comparison means that the encrypted identifier to be verified is consistent with the encrypted user identifier; and the failure of comparison means that the encrypted identifier to be verified is inconsistent with the encrypted user identifier. In practical application, a preset string matching algorithm may be used to realize the comparison between the encrypted identifier to be verified and the encrypted user identifier, where the preset self-string matching algorithm may be a BM (Boyer-Moore) algorithm, a KMP (Knuth-Morris-PrattAlgorithm) algorithm, etc., and the application is not limited specifically.
For example, based on the preset character string matching algorithm A, the encrypted identification to be verified "2569d419bfea999ff13fd1f7f4498b89" is compared with the encrypted user identification "2569d419bfea999ff13fd1f7f4498b89", and the encrypted identification to be verified "2569d419bfea999ff13fd1f7f4498b89" is determined to be matched with each character in the encrypted user identification "2569d419bfea999ff13fd1f7f4498b89", and then the comparison result is determined to be successful.
For another example, based on the preset character string matching algorithm B, the encrypted identifier "ccdcb2e80ee2cbf2520844498e4169B0" to be verified is compared with the encrypted user identifier "2569d419bfea999ff13fd1f7f4498B89", and it is determined that the encrypted identifier "ccdcb2e80ee2cbf2520844498e4169B0" to be verified and the encrypted user identifier "2569d419bfea999ff13fd 13f 1f7f4498B89" have unmatched characters, that is, the matching fails, and the comparison result is determined as the comparison failure.
And comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result so as to determine the attribute information of the target play address based on the comparison result.
Step 108: and determining attribute information of the target heartbeat data based on the comparison result.
Wherein the attribute information refers to a valid attribute or an invalid attribute; the attribute information of the target heartbeat data is determined based on the comparison result of the encrypted identifier to be verified and the encrypted user identifier.
In practical application, the specific method for determining the attribute information of the target heartbeat data based on the comparison result comprises the following steps:
under the condition that the comparison result is that the comparison is successful, determining that the attribute information of the target heartbeat data is effective;
and under the condition that the comparison result is that the comparison fails, determining that the attribute information of the target heartbeat data is invalid.
Specifically, if the comparison result of the encrypted identifier to be verified and the encrypted user identifier is that the comparison is successful, the target heartbeat data is indicated to be generated by the target client based on the play address and the user identifier to be verified, that is, the target heartbeat data is effective data, and can be used for counting the number of people watched in the live broadcasting room; and under the condition that the comparison result of the encrypted identifier to be verified and the encrypted user identifier is that the comparison fails, indicating whether the target heartbeat data is generated by randomly acquiring the user identifier and the playing address by an illegal user, namely, the target heartbeat data is invalid data, and discarding the target heartbeat data when counting the number of people watched in the live broadcasting room based on the heartbeat data, so as to ensure the authenticity of the number of people watched.
For example, when the comparison result is obtained as a comparison success, setting the attribute information of the heartbeat data b to be valid;
For another example, in the case where the comparison result is obtained as a comparison failure, the attribute information of the heartbeat data b is set to be invalid.
And setting attribute information of the heartbeat data based on the acquired comparison result so as to determine whether to count the number of people watching the target heartbeat data in the live broadcasting room based on the attribute information of the heartbeat data.
In practical application, if the to-be-verified identifier and the encrypted user identifier are both preset identifiers under the condition that the to-be-verified identifier and the encrypted user identifier are successfully compared, the authenticity of the target heartbeat data needs to be further determined.
The target heartbeat data comprises a live broadcast room identifier, and the method for determining that the attribute information of the target heartbeat data is effective under the condition that the comparison result is successful comprises the following steps:
acquiring an unregistered user weight interval under the condition that the encryption identifier to be verified is consistent with a preset identifier;
determining a target live broadcasting room based on the live broadcasting room identification, and acquiring a target unregistered user weight of the target live broadcasting room;
and determining that the attribute information of the target heartbeat data is valid under the condition that the target unregistered user weight is located in the unregistered user weight section.
The preset identifier refers to a field indicating a special meaning, for example, the preset identifier is 0, which indicates that the user is in a state of not logging in the live broadcast viewing platform; the target unregistered user weight refers to the ratio of unregistered viewing users in the total number of viewing people in the target living room; the preset unregistered user weight interval is a ratio interval determined based on the unregistered user weight of the platform and a preset ratio, for example, the preset ratio is ten percent, that is, 0.1, the unregistered user weight of the live platform is 3:4, that is, 0.75, the unregistered user weight interval is an interval upper limit value obtained by adding 0.75 to 0.1 and obtaining 0.85 by subtracting 0.1 from 0.75, and finally, the unregistered user weight interval is determined to be 0.65-0.85.
Specifically, under the condition that the encryption identifier to be verified is consistent with the encryption user identifier, determining that the encryption identifier to be verified or the encryption user identifier is consistent with a preset identifier, and acquiring an unregistered user weight interval; determining a target live broadcasting room according to the live broadcasting room identification, and acquiring the weight of a target unregistered user of the target live broadcasting room; if the target unregistered weight is determined to be in the unregistered user weight interval, setting the attribute information of the target heartbeat data to be effective; in practical application, there is a small difference between the ratio of the unregistered user to the logged user of the live broadcast platform and the ratio of the unregistered user to the logged user in each live broadcast room in the platform, if the target unregistered weight is determined to be in the weight interval of the unregistered user, the ratio of the unregistered user to the logged user in the current target live broadcast room is indicated to be in a stable state, the risk of the situation that the brushing amount exists in the target live broadcast room is small, and the target heartbeat data in the unregistered state can be used for counting the number of watching persons in the live broadcast room.
If the target unregistered user weight is located outside the unregistered user weight interval, the method further includes:
and determining that the attribute information of the target heartbeat data is invalid under the condition that the target unregistered user weight is located outside the unregistered user weight section.
Specifically, the weight of the target unregistered user in the target live broadcasting room is obtained, and if the weight of the unregistered user is outside the weight interval, it indicates that the target live broadcasting room has a higher risk of brushing, then the attribute information of the target heartbeat data needs to be set as invalid.
In addition, in the state that the to-be-verified encrypted identifier and the encrypted user identifier are successfully compared, besides the situation that the to-be-verified encrypted identifier or the encrypted user identifier is a preset identifier, the situation that the to-be-verified encrypted identifier or the encrypted user identifier is not matched with the preset identifier exists, for example, the user identifier randomly acquired by an illegal user is encrypted and then is matched with the encrypted user identifier in the play address, and then the authenticity of the target heartbeat data needs to be further judged.
And under the condition that the comparison result is that the comparison is successful, determining that the attribute information of the target heartbeat data is valid comprises the following steps:
Under the condition that the encryption identification to be verified is inconsistent with a preset identification, determining a target live broadcasting room based on the live broadcasting room identification, and acquiring the total number of logged terminals of the user identification to be verified in the target live broadcasting room;
and determining that the attribute information of the target heartbeat data is valid under the condition that the total number of the logged terminals is smaller than or equal to the total number of the preset terminals.
The total number of logged-in terminals refers to the total number of devices when a user views a target live broadcast room on different devices based on the same account, for example, when the user A uses the same account to log in mobile phone equipment and computer equipment to view the content of the live broadcast room d, the total number of logged-in terminals of the user A in the live broadcast room d is 2; the preset total number of terminals refers to an upper limit value of the total number of devices which can log in by the same account, for example, the account of the user A can log in 5 devices at the same time.
Specifically, on the basis that the comparison result is that the comparison is successful, if the encrypted identifier to be verified or the encrypted user identifier is inconsistent with the preset identifier, determining a target live broadcasting room based on the live broadcasting room identifier, and acquiring the total number of logged terminals of the user identifier to be verified in the target live broadcasting room; when the total number of logged terminals is less than or equal to the preset total number of terminals, the risk that the user is a swipe number user is small, so that the attribute information of the target heartbeat data is set to be effective at the moment.
If the total number of the logged terminals is greater than the total number of the preset terminals, the method further comprises the following steps:
and under the condition that the total number of the logged terminals is larger than the total number of the preset terminals, determining that the attribute information of the target heartbeat data is invalid.
Specifically, since the total number of logged-in terminals is greater than the total number of preset terminals, that is, the total number of terminals logged in by the user exceeds the upper limit, which indicates that the login of the real user is not performed, the attribute information of the target heartbeat data needs to be set to be invalid at this time.
By comparing the total number of logged-in terminals of the user with the total number of preset terminals, the attribute information of the target heartbeat data is determined to be invalid under the condition that the total number of logged-in terminals is larger than the total number of preset terminals, so that the follow-up real statistics of the number of watching persons in the target living broadcast room is facilitated.
After the attribute information of the target heartbeat data is determined, the number of viewers in the target living broadcast room can be counted according to the attribute information of the target heartbeat data.
In an actual application, after determining the attribute information of the target heartbeat data based on the comparison result, the method further includes:
determining a target live broadcasting room according to the live broadcasting room identification;
and counting the number of online users in the target living broadcast room based on the attribute information of the target heartbeat data.
Specifically, the heartbeat server receives multi-item target heartbeat data, each target heartbeat data comprises a target live broadcast room identifier, and the number of online users which can be used for counting and watching the target live broadcast room is determined according to the target live broadcast room identifier and attribute information of the target heartbeat data.
For example, the heartbeat server classifies the target heartbeat data based on the identification of the living broadcast room in the target heartbeat data, and determines the target heartbeat data of the target living broadcast room; and acquiring attribute information of target heartbeat data of the target live broadcasting room, and counting the number of online watching users of the target live broadcasting room based on the attribute information for the effective target heartbeat data.
By determining the attribute information of the target heartbeat data, under the condition that the attribute information of the target heartbeat data is effective, counting the number of viewers in the target living room based on the target heartbeat data, thereby obtaining a more real number of viewers in the living room and facilitating the follow-up recommendation of the living room for the user based on the number of viewers in the living room.
The data processing method applied to the heartbeat server encrypts the user identifier to be verified based on a preset encryption algorithm after receiving target heartbeat data containing the user identifier to be verified and a target playing address carrying the encrypted user identifier, and obtains the encrypted identifier to be verified; and comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result, and determining attribute information of the target heartbeat data based on the comparison result.
The method comprises the steps of receiving target heartbeat data containing a user identifier to be verified and a target play address carrying an encrypted user identifier so as to encrypt the user identifier to be verified based on a preset encryption algorithm to obtain the encrypted identifier to be verified; and comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result, so as to determine whether the user identifier to be verified is consistent with the user identifier in the play address, namely, whether the user identifier to be verified is randomly acquired by an illegal user, and further, the validity of the target heartbeat data is conveniently determined.
Fig. 2 shows a flowchart of another data processing method according to an embodiment of the present application, which is applied to a scheduling server, and specifically includes the following steps:
step 202: and receiving a play address acquisition request. Wherein, the play address acquisition request contains a target user identifier.
The play address obtaining request refers to a request for obtaining a play address of a target live broadcasting room; in practical application, a client generates a play address acquisition request based on the requirement of a user for watching a live broadcast room, and then sends the play address acquisition request to a scheduling server; the target user identification refers to a user identity field that identifies the viewing target user, such as a user ID, a user number, and the like.
Specifically, the client generates a play address acquisition request according to the operation of triggering the watching live broadcast room by the user, wherein the play address acquisition request comprises a target user identifier of the user watching the target live broadcast room; sending a play address acquisition request containing a target user identifier to a scheduling server; a play address acquisition request is received by the scheduling server.
For example, the target client a generates a play address acquisition request of the play live room h based on the user identifier f, and sends the play address acquisition request to the scheduling server; a play address acquisition request is received by the scheduling server.
By receiving the play address containing the target user identifier, the subsequent return of the play address containing the user identifier to the target client is facilitated.
Step 204: and encrypting the target user identifier based on a preset encryption algorithm to obtain an encrypted user identifier.
The preset encryption algorithm refers to an algorithm for encrypting the target user identifier, a Hash encryption algorithm, a DES encryption algorithm and the like, and the application is not particularly limited; the encrypted user identifier refers to a field or a character string obtained by encrypting the target user identifier based on a preset encryption algorithm.
Specifically, after receiving the play address acquisition request, the scheduling server analyzes the play address acquisition request to obtain a target user identifier; and determining a preset encryption algorithm, and encrypting the target user identification based on the preset encryption algorithm to obtain an encrypted user identification.
For example, the scheduling server receives the play address acquisition request m, and analyzes the play address acquisition request m to obtain a user identifier n; and encrypting the user identifier n based on a DES encryption algorithm preset in the scheduling server to obtain an encrypted user identifier n1.
The target user identifier in the play address acquisition request is determined, and the target user identifier is encrypted based on a preset encryption algorithm to obtain an encrypted user identifier, so that the subsequent generation of the play address containing the encrypted user identifier is facilitated.
Step 206: and acquiring a play address corresponding to the target user identifier, generating a target play address based on the encrypted user identifier and the play address, and sending the target play address to a target client.
The playing address corresponding to the target user identifier refers to a live broadcast room address of a live broadcast room watched by the target user; the target play address is a play address containing an encrypted user identifier; the target client refers to a client that sends a play address acquisition request.
Specifically, according to a live broadcasting room identifier corresponding to a target user identifier, determining a play address corresponding to the live broadcasting room identifier in a scheduling server; generating a target play address according to the determined play address and the encrypted user identifier; the generated target play address may be returned to the target client so that subsequent target clients may generate heartbeat data based on the target play address containing the encrypted user identification.
For example, the client i sends an acquisition request for acquiring a play address of the live broadcast room a to the scheduling server; the scheduling server determines the playing address of the live broadcasting room A according to the live broadcasting room identification corresponding to the user identification in the acquisition request, and generates a target playing address according to the encrypted user identification and the playing address; and returning the target playing address to the client i.
And returning the target play address containing the encrypted user identifier to the target client, so that the subsequent target client can conveniently generate heartbeat data based on the target play address, and further the heartbeat server receiving the heartbeat data can determine attribute information of the heartbeat data based on the encrypted user identifier.
The method is applied to a data processing method of a scheduling server, and a play address acquisition request is received, wherein the play address acquisition request comprises a target user identifier; encrypting the target user identifier based on a preset encryption algorithm to obtain an encrypted user identifier; and acquiring a play address corresponding to the target user identifier, generating a target play address based on the encrypted user identifier and the play address, and sending the target play address to a target client.
The target user identifier in the play address acquisition request is encrypted to obtain an encrypted user identifier, so that a target play address is conveniently generated according to the encrypted user identifier; and sending the target play address to the target client, so that the subsequent target client can conveniently generate heartbeat data based on the target play address, and further the heartbeat server can determine attribute information of the heartbeat data based on the encrypted user identification in the heartbeat data.
The following describes, with reference to fig. 3, an example of an application of the data processing method provided in the present application to counting the number of viewers in a live broadcast room a. Fig. 3 is a schematic process flow diagram of a data processing method applied to counting the number of viewers in a live broadcasting room a according to an embodiment of the present application, specifically including the following steps:
step 302: the target client generates a play address acquisition request for acquiring the play address of the live broadcasting room A based on the target user identification.
Step 304: and the target client sends the play address acquisition request to the scheduling server.
Step 306: the scheduling server encrypts the target user identifier based on a preset encryption algorithm to obtain an encrypted user identifier.
Step 308: the scheduling server determines the play address of the live broadcast room A and generates a target play address based on the play address and the encrypted user identification.
Step 310: and the scheduling server returns the target playing address to the target client.
Step 312: and the target client generates target heartbeat data based on the user identification to be verified and the target play address.
Step 314: and the target client sends the target heartbeat data to the heartbeat server.
Step 316: and the heartbeat server encrypts the user identifier to be verified in the target heartbeat data based on a preset encryption rule to obtain the encrypted identifier to be verified.
Step 318: and the heartbeat server compares the encrypted identifier to be verified with the encrypted user to obtain a comparison result, and determines attribute information of the target heartbeat data based on the comparison result.
Step 320: and the heartbeat server counts the number of watching users in the live broadcasting room A based on the attribute information of the target heartbeat data.
According to the data processing method, target heartbeat data containing the user identifier to be verified and the target playing address carrying the encrypted user identifier are received, so that the user identifier to be verified is encrypted based on a preset encryption algorithm, and the encrypted identifier to be verified is obtained; and comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result, so as to determine whether the user identifier to be verified is consistent with the user identifier in the play address, namely, whether the user identifier to be verified is randomly acquired by an illegal user, and further, the validity of the target heartbeat data is conveniently determined.
Corresponding to the method embodiment described above, the present application further provides an embodiment of a data processing system, and fig. 4 shows a schematic structural diagram of a data processing system according to an embodiment of the present application. As shown in fig. 4, the system includes a heartbeat server 406, a dispatch server 404, and a target client 402, wherein:
the target client 402 is configured to obtain a target user identifier, generate a play address obtaining request based on the target user identifier, and send the play address obtaining request to the scheduling server;
the scheduling server 404 is configured to receive the play address acquisition request, where the play address acquisition request includes the target user identifier; encrypting the target user identifier based on a preset encryption algorithm to obtain an encrypted user identifier; acquiring a play address corresponding to the target user identifier, generating a target play address based on the play address and the encrypted user identifier, and transmitting the target play address to the target client;
the target client 402 is further configured to receive the target play address, where the target play address includes the encrypted user identifier; generating target heartbeat data based on the user identification to be verified and the target play address, and sending the target heartbeat data to the heartbeat server;
The heartbeat server 406 is configured to receive the target heartbeat data, where the target heartbeat data includes the user identifier to be verified and a target play address carrying the encrypted user identifier; encrypting the user identifier to be verified based on the preset encryption algorithm to obtain an encrypted identifier to be verified; comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result; and determining attribute information of the target heartbeat data based on the comparison result.
In the data processing system, when a client sends a play address acquisition request to a scheduling server, a target user identifier is carried in the play address acquisition request; the scheduling server encrypts the target user identifier to obtain an encrypted user identifier, and generates a target play address containing the user encrypted identifier, so that the difficulty of intercepting the play address by an illegal user is increased, and the risk of interception by the illegal user when the scheduling server returns the play address to the client is reduced; the client generates heartbeat data based on the encrypted user identifier and the user identifier to be verified, and sends the heartbeat data to the heartbeat server; the heartbeat server encrypts the encrypted identification to be verified to obtain the encrypted identification to be verified, and the attribute information of the heartbeat data is determined by comparing the encrypted user identification with the encrypted identification to be verified, so that the number of people in the live broadcasting room is counted based on the heartbeat data of the effective attribute information, and the authenticity and the effectiveness of the user information in the live broadcasting room are improved.
Corresponding to the method embodiment, the present application further provides an embodiment of a data processing device, and fig. 5 shows a schematic structural diagram of a data processing device according to an embodiment of the present application. As shown in fig. 5, the apparatus includes:
the first receiving module 502 is configured to receive target heartbeat data, where the target heartbeat data includes a user identifier to be verified and a target play address carrying an encrypted user identifier;
the first encryption module 504 is configured to encrypt the user identifier to be verified based on a preset encryption algorithm to obtain an encrypted identifier to be verified;
a comparison module 506 configured to compare the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result;
a determining module 508 is configured to determine attribute information of the target heartbeat data based on the comparison result.
In a specific embodiment of the present application, the apparatus further includes a statistics module configured to:
determining a target live broadcasting room according to the live broadcasting room identification;
and counting the number of online users in the target living broadcast room based on the attribute information of the target heartbeat data.
The comparison module 506 is further configured to:
Under the condition that the to-be-verified encrypted identifier is consistent with the encrypted user identifier, determining that the comparison result is successful;
and under the condition that the to-be-verified encrypted identifier is inconsistent with the encrypted user identifier in comparison, determining that the comparison result is failure in comparison.
The determining module 508 is further configured to:
under the condition that the comparison result is that the comparison is successful, determining that the attribute information of the target heartbeat data is effective;
and under the condition that the comparison result is that the comparison fails, determining that the attribute information of the target heartbeat data is invalid.
The determining module 508 is further configured to:
acquiring an unregistered user weight interval under the condition that the encryption identifier to be verified is consistent with a preset identifier;
determining a target live broadcasting room based on the live broadcasting room identification, and acquiring a target unregistered user weight of the target live broadcasting room;
and determining that the attribute information of the target heartbeat data is valid under the condition that the target unregistered user weight is located in the unregistered user weight section.
The determining module 508 is further configured to:
and determining that the attribute information of the target heartbeat data is invalid under the condition that the target unregistered user weight is located outside the unregistered user weight section.
The determining module 508 is further configured to:
under the condition that the encryption identification to be verified is inconsistent with a preset identification, determining a target live broadcasting room based on the live broadcasting room identification, and acquiring the total number of logged terminals of the user identification to be verified in the target live broadcasting room;
and determining that the attribute information of the target heartbeat data is valid under the condition that the total number of the logged terminals is smaller than or equal to the total number of the preset terminals.
The apparatus further includes a determination submodule configured to:
and under the condition that the total number of the logged terminals is larger than the total number of the preset terminals, determining that the attribute information of the target heartbeat data is invalid.
The data processing device is applied to a heartbeat server, and comprises a first receiving module and a second receiving module, wherein the first receiving module is used for receiving target heartbeat data, and the target heartbeat data comprises a user identifier to be verified and a target playing address carrying an encrypted user identifier; the first encryption module encrypts the user identifier to be verified based on a preset encryption algorithm to obtain an encrypted identifier to be verified; the comparison module is used for comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result; and the determining module is used for determining attribute information of the target heartbeat data based on the comparison result.
The method comprises the steps of receiving target heartbeat data containing a user identifier to be verified and a target play address carrying an encrypted user identifier so as to encrypt the user identifier to be verified based on a preset encryption algorithm to obtain the encrypted identifier to be verified; and comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result, so as to determine whether the user identifier to be verified is consistent with the user identifier in the play address, namely, whether the user identifier to be verified is randomly acquired by an illegal user, and further, the validity of the target heartbeat data is conveniently determined.
The above is a schematic solution of a data processing apparatus of the present embodiment. It should be noted that, the technical solution of the data processing apparatus and the technical solution of the data processing method belong to the same concept, and details of the technical solution of the data processing apparatus, which are not described in detail, can be referred to the description of the technical solution of the data processing method.
Corresponding to the above method embodiments, the present application further provides an embodiment of a data processing apparatus, and fig. 6 shows a schematic structural diagram of another data processing apparatus according to an embodiment of the present application. As shown in fig. 6, the apparatus includes:
A second receiving module 602, configured to receive a play address acquisition request, where the play address acquisition request includes a target user identifier;
a second encryption module 604, configured to encrypt the target user identifier based on a preset encryption algorithm to obtain an encrypted user identifier;
the generating module 606 is configured to obtain a play address corresponding to the target user identifier, generate a target play address based on the encrypted user identifier and the play address, and send the target play address to a target client.
The data processing device is applied to the scheduling server, and the second receiving module is used for receiving a play address acquisition request, wherein the play address acquisition request comprises a target user identifier; the second encryption module encrypts the target user identifier based on a preset encryption algorithm to obtain an encrypted user identifier; the generation module acquires a play address corresponding to the target user identifier, generates a target play address based on the encrypted user identifier and the play address, and sends the target play address to a target client.
The target user identifier in the play address acquisition request is encrypted to obtain an encrypted user identifier, so that a target play address is conveniently generated according to the encrypted user identifier; and sending the target play address to the target client, so that the subsequent target client can conveniently generate heartbeat data based on the target play address, and further the heartbeat server can determine attribute information of the heartbeat data based on the encrypted user identification in the heartbeat data.
The above is another exemplary embodiment of the data processing apparatus of the present embodiment. It should be noted that, the technical solution of the data processing apparatus and the technical solution of the other data processing method belong to the same concept, and details of the technical solution of the data processing apparatus, which are not described in detail, can be referred to the description of the technical solution of the data processing method.
Fig. 7 illustrates a block diagram of a computing device 700 provided in accordance with an embodiment of the present application. The components of computing device 700 include, but are not limited to, memory 710 and processor 720. Processor 720 is coupled to memory 710 via bus 730, and database 750 is used to store data.
Computing device 700 also includes access device 740, access device 740 enabling computing device 700 to communicate via one or more networks 760. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. The access device 740 may include one or more of any type of network interface, wired or wireless (e.g., a Network Interface Card (NIC)), such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present application, the above-described components of computing device 700, as well as other components not shown in FIG. 7, may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device illustrated in FIG. 7 is for exemplary purposes only and is not intended to limit the scope of the present application. Those skilled in the art may add or replace other components as desired.
Computing device 700 may be any type of stationary or mobile computing device including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smart phone), wearable computing device (e.g., smart watch, smart glasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 700 may also be a mobile or stationary server.
Wherein the processor 720 performs the steps of the data processing method when executing the computer instructions.
The foregoing is a schematic illustration of a computing device of this embodiment. It should be noted that, the technical solution of the computing device and the technical solution of the data processing method belong to the same concept, and details of the technical solution of the computing device, which are not described in detail, can be referred to the description of the technical solution of the data processing method.
An embodiment of the present application also provides a computer-readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the data processing method as described above.
The above is an exemplary version of a computer-readable storage medium of the present embodiment. It should be noted that, the technical solution of the storage medium and the technical solution of the data processing method belong to the same concept, and details of the technical solution of the storage medium which are not described in detail can be referred to the description of the technical solution of the data processing method.
The foregoing describes specific embodiments of the present application. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The computer instructions include computer program code that may be in source code form, object code form, executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
It should be noted that, for the sake of simplicity of description, the foregoing method embodiments are all expressed as a series of combinations of actions, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily all necessary for the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
The above-disclosed preferred embodiments of the present application are provided only as an aid to the elucidation of the present application. Alternative embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the teaching of this application. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. This application is to be limited only by the claims and the full scope and equivalents thereof.

Claims (14)

1. A data processing method, applied to a heartbeat server, comprising:
receiving target heartbeat data, wherein the target heartbeat data comprises a user identifier to be verified and a target play address carrying an encrypted user identifier;
encrypting the user identifier to be verified based on a preset encryption algorithm to obtain an encrypted identifier to be verified;
comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result;
determining attribute information of the target heartbeat data based on the comparison result, wherein determining the attribute information of the target heartbeat data based on the comparison result comprises: and under the condition that the comparison result of the encrypted identifier to be verified and the encrypted user identifier is successful, determining that the attribute information of the target heartbeat data is effective.
2. The data processing method according to claim 1, wherein the target heartbeat data includes a live room identifier;
after determining the attribute information of the target heartbeat data based on the comparison result, the method further comprises the following steps:
determining a target live broadcasting room according to the live broadcasting room identification;
and counting the number of online users in the target living broadcast room based on the attribute information of the target heartbeat data.
3. The data processing method according to claim 1, wherein comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result includes:
under the condition that the to-be-verified encrypted identifier is consistent with the encrypted user identifier, determining that the comparison result is successful;
and under the condition that the to-be-verified encrypted identifier is inconsistent with the encrypted user identifier in comparison, determining that the comparison result is failure in comparison.
4. The data processing method according to claim 3, wherein determining attribute information of the target heartbeat data based on the comparison result, further comprises:
and under the condition that the comparison result is that the comparison fails, determining that the attribute information of the target heartbeat data is invalid.
5. The data processing method according to claim 1, wherein the target heartbeat data includes a live room identifier;
and under the condition that the comparison result is that the comparison is successful, determining that the attribute information of the target heartbeat data is valid comprises the following steps:
acquiring an unregistered user weight interval under the condition that the encryption identifier to be verified is consistent with a preset identifier, wherein the unregistered user weight interval is determined based on a preset ratio and an unregistered user weight;
Determining a target live broadcasting room based on the live broadcasting room identification, and acquiring a target unregistered user weight of the target live broadcasting room;
and determining that the attribute information of the target heartbeat data is valid under the condition that the target unregistered user weight is located in the unregistered user weight section.
6. The data processing method of claim 5, wherein the method further comprises:
and determining that the attribute information of the target heartbeat data is invalid under the condition that the target unregistered user weight is located outside the unregistered user weight section.
7. The data processing method according to claim 1, wherein the target heartbeat data includes a live room identifier;
and under the condition that the comparison result is that the comparison is successful, determining that the attribute information of the target heartbeat data is valid comprises the following steps:
under the condition that the encryption identification to be verified is inconsistent with a preset identification, determining a target live broadcasting room based on the live broadcasting room identification, and acquiring the total number of logged terminals of the user identification to be verified in the target live broadcasting room;
and determining that the attribute information of the target heartbeat data is valid under the condition that the total number of the logged terminals is smaller than or equal to the total number of the preset terminals.
8. The data processing method of claim 7, wherein the method further comprises:
and under the condition that the total number of the logged terminals is larger than the total number of the preset terminals, determining that the attribute information of the target heartbeat data is invalid.
9. A data processing method, applied to a scheduling server, comprising:
receiving a play address acquisition request, wherein the play address acquisition request comprises a target user identifier;
encrypting the target user identifier based on a preset encryption algorithm to obtain an encrypted user identifier;
the method comprises the steps of obtaining a playing address corresponding to a target user identifier, generating a target playing address based on the encrypted user identifier and the playing address, and sending the target playing address to a target client, wherein the encrypted user identifier is used for determining that attribute information of target heartbeat data is effective when a comparison result of the encrypted identifier to be verified and the encrypted user identifier is successful by a heartbeat server, and the encrypted identifier to be verified is obtained by encrypting the user identifier to be verified in the target heartbeat data.
10. A data processing system comprising a heartbeat server, a dispatch server, and a target client, wherein:
The target client is configured to acquire a target user identifier, generate a play address acquisition request based on the target user identifier, and send the play address acquisition request to the scheduling server;
the scheduling server is configured to receive the play address acquisition request, wherein the play address acquisition request contains the target user identifier; encrypting the target user identifier based on a preset encryption algorithm to obtain an encrypted user identifier; acquiring a play address corresponding to the target user identifier, generating a target play address based on the play address and the encrypted user identifier, and sending the target play address to the target client, wherein the encrypted user identifier is used for determining that attribute information of target heartbeat data is valid when a comparison result of the encrypted identifier to be verified and the encrypted user identifier is successful by a heartbeat server, and the encrypted identifier to be verified is obtained by encrypting the user identifier to be verified in the target heartbeat data;
the target client is further configured to receive the target play address, where the target play address includes the encrypted user identifier; generating target heartbeat data based on the user identification to be verified and the target play address, and sending the target heartbeat data to the heartbeat server;
The heartbeat server is configured to receive the target heartbeat data, wherein the target heartbeat data comprises the user identifier to be verified and a target play address carrying the encrypted user identifier; encrypting the user identifier to be verified based on the preset encryption algorithm to obtain an encrypted identifier to be verified; comparing the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result; determining attribute information of the target heartbeat data based on the comparison result, wherein determining the attribute information of the target heartbeat data based on the comparison result comprises: and under the condition that the comparison result of the encrypted identifier to be verified and the encrypted user identifier is successful, determining that the attribute information of the target heartbeat data is effective.
11. A data processing apparatus, for use with a heartbeat server, comprising:
the first receiving module is configured to receive target heartbeat data, wherein the target heartbeat data comprises a user identifier to be verified and a target playing address carrying an encrypted user identifier;
the first encryption module is configured to encrypt the user identifier to be verified based on a preset encryption algorithm to obtain an encrypted identifier to be verified;
The comparison module is configured to compare the encrypted identifier to be verified with the encrypted user identifier to obtain a comparison result;
the determining module is configured to determine attribute information of the target heartbeat data based on the comparison result and a preset identifier, wherein the determining the attribute information of the target heartbeat data based on the comparison result comprises: and under the condition that the comparison result of the encrypted identifier to be verified and the encrypted user identifier is successful, determining that the attribute information of the target heartbeat data is effective.
12. A data processing apparatus, for use in a dispatch server, comprising:
the second receiving module is configured to receive a play address acquisition request, wherein the play address acquisition request comprises a target user identifier;
the second encryption module is configured to encrypt the target user identifier based on a preset encryption algorithm to obtain an encrypted user identifier;
the generation module is configured to acquire a play address corresponding to the target user identifier, generate a target play address based on the encrypted user identifier and the play address, and send the target play address to a target client, wherein the encrypted user identifier is used for determining that attribute information of target heartbeat data is valid when a comparison result of the encrypted identifier to be verified and the encrypted user identifier is successful by a heartbeat server, and the encrypted identifier to be verified is obtained by encrypting the user identifier to be verified in the target heartbeat data.
13. A computing device comprising a memory, a processor, and computer instructions stored on the memory and executable on the processor, wherein the processor, when executing the computer instructions, performs the steps of the method of any one of claims 1-9.
14. A computer readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the method of any one of claims 1-9.
CN202210124070.2A 2022-02-10 2022-02-10 Data processing method and device Active CN114466215B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202210124070.2A CN114466215B (en) 2022-02-10 2022-02-10 Data processing method and device
PCT/CN2022/143525 WO2023151415A1 (en) 2022-02-10 2022-12-29 Data processing methods and apparatuses

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210124070.2A CN114466215B (en) 2022-02-10 2022-02-10 Data processing method and device

Publications (2)

Publication Number Publication Date
CN114466215A CN114466215A (en) 2022-05-10
CN114466215B true CN114466215B (en) 2023-08-01

Family

ID=81414093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210124070.2A Active CN114466215B (en) 2022-02-10 2022-02-10 Data processing method and device

Country Status (2)

Country Link
CN (1) CN114466215B (en)
WO (1) WO2023151415A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114466215B (en) * 2022-02-10 2023-08-01 上海哔哩哔哩科技有限公司 Data processing method and device

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20090157891A1 (en) * 2007-12-13 2009-06-18 General Instrument Corporation Method and Apparatus for Inserting Time-Variant Data into a Media Stream
CN106060594B (en) * 2016-05-25 2019-04-23 武汉斗鱼网络科技有限公司 A kind of white list generation system and method based on player heartbeat
CN107579968B (en) * 2017-08-30 2018-07-06 武汉斗鱼网络科技有限公司 Video flowing address detection method, device and server
CN110072127B (en) * 2018-01-24 2021-09-24 腾讯科技(深圳)有限公司 Media stream playing processing method, device, system, storage medium and equipment
CN110012317A (en) * 2019-04-15 2019-07-12 北京乐学帮网络技术有限公司 A kind of video acquiring method and device, a kind of video encryption method and device
US11652818B2 (en) * 2019-07-18 2023-05-16 Advanced New Technologies Co., Ltd. Method and apparatus for accessing service system
CN110392057B (en) * 2019-07-30 2021-09-10 秒针信息技术有限公司 Method and device for monitoring abnormal flow and encrypting monitoring code
CN113068052B (en) * 2021-03-15 2022-04-01 上海哔哩哔哩科技有限公司 Method for determining brushing amount of live broadcast room, live broadcast method and data processing method
CN113938318B (en) * 2021-12-01 2023-12-12 上海哔哩哔哩科技有限公司 Method and device for determining live broadcast room brushing amount
CN114466215B (en) * 2022-02-10 2023-08-01 上海哔哩哔哩科技有限公司 Data processing method and device

Also Published As

Publication number Publication date
CN114466215A (en) 2022-05-10
WO2023151415A1 (en) 2023-08-17

Similar Documents

Publication Publication Date Title
CN107454441B (en) A kind of method, live streaming Platform Server and the computer readable storage medium of detection direct broadcasting room brush popularity behavior
CN113068052B (en) Method for determining brushing amount of live broadcast room, live broadcast method and data processing method
CN112995689B (en) Method and device for determining brushing amount of live broadcast room
US20170279616A1 (en) Dynamic user behavior rhythm profiling for privacy preserving personalized service
US8375459B2 (en) Frequency based age determination
CN107347054B (en) Identity verification method and device
CN106254220B (en) The management method and device of instant messaging group
CN113067808B (en) Data processing method, live broadcast method, authentication server and live broadcast data server
CN107196917B (en) Service response method and middleware thereof
CN107248995B (en) Account verification method and device
CN114466215B (en) Data processing method and device
CN114518918A (en) Data processing method, device, equipment and storage medium
CN111131127B (en) Communication method based on live broadcast platform and related device
CN106230860B (en) Method and device for transmitting streaming media
CN110248211B (en) Live broadcast room message current limiting method and device, electronic equipment and storage medium
CN112753031A (en) Media content control
CN110798529B (en) Data processing method, block chain link point equipment and computer storage medium
CN114945097B (en) Video stream processing method and device
CN104602039A (en) Video service processing method, device and system
CN112995686B (en) Data processing method, live broadcast method, authentication server and live broadcast data server
CN113840157B (en) Access detection method, system and device
CN116155537A (en) Data processing method for meta-universe system and intelligent terminal
WO2020046201A1 (en) Apparatus and methods for deriving fingerprints and matching of communications devices transitioning between communications networks
CN114679600A (en) Data processing method and device
CN112598843B (en) Voting data processing method and device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant