WO2019061627A1 - 一种数据校验方法及服务器 - Google Patents

一种数据校验方法及服务器 Download PDF

Info

Publication number
WO2019061627A1
WO2019061627A1 PCT/CN2017/108051 CN2017108051W WO2019061627A1 WO 2019061627 A1 WO2019061627 A1 WO 2019061627A1 CN 2017108051 W CN2017108051 W CN 2017108051W WO 2019061627 A1 WO2019061627 A1 WO 2019061627A1
Authority
WO
WIPO (PCT)
Prior art keywords
blockchain
server
client
blockchains
data
Prior art date
Application number
PCT/CN2017/108051
Other languages
English (en)
French (fr)
Inventor
周志刚
陈少杰
张文明
Original Assignee
武汉斗鱼网络科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 武汉斗鱼网络科技有限公司 filed Critical 武汉斗鱼网络科技有限公司
Publication of WO2019061627A1 publication Critical patent/WO2019061627A1/zh

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data

Definitions

  • the present invention relates to the field of video live broadcast technology, and in particular, to a data verification method and a server.
  • Some anchors will gain popularity by increasing the number of viewers watching the room at the same time by brushing the popularity.
  • the specific implementation method of popular popularity is on a server with very good performance, by cracking the network protocol of the live broadcast platform, and forging a large number of fake client users to log in to the live broadcast room at the same time, thereby forging a large number of viewers.
  • the popularity data of the live broadcast room is relatively high.
  • the embodiment of the invention provides a data verification method and a server to detect the situation in which the false client is faked by the fake client in the live broadcast.
  • the present application provides a data verification method, the method comprising:
  • the server delivers the first blockchain to all clients in all rooms of the live platform, so that each client receives the first blockchain and generates a second blockchain, and the second blockchain is generated. Sent to the server;
  • the server receives all second blockchains returned by all clients
  • the server determines, in all the second blockchains, that the same second blockchain has the largest number of legitimate second blockchains, and the other is an illegal second blockchain;
  • the server determines that the client corresponding to the legal second blockchain is a legitimate client, and the client corresponding to the illegal second blockchain is an illegal client.
  • the method further includes:
  • the server generates the first blockchain.
  • first blockchain and the second blockchain have the same data structure
  • the data structure includes a block number of a blockchain, a hash value of a previous block chain, a timestamp of a current time, and blockchain function data, where the blockchain function data is random data randomly generated by the server. Or the data obtained by encrypting after generating a fixed data encryption.
  • the method further includes:
  • the server receives a second blockchain sent by the target client that does not have the live platform target room in all the second blockchains returned by the client, and the target client is still in the target room And determining that the target client is an illegal client.
  • the server determines, in all the second blockchains, that the second largest blockchain is the legal second blockchain, and the other is the illegal second blockchain, including:
  • the server takes each second blockchain of all the second blockchains as a value
  • the server determines that the most numerical value of all the values is a legal value, and determines the second blockchain corresponding to the legal value as a legal second blockchain, and the other is an illegal second blockchain.
  • the application provides a server, where the server includes:
  • a sending module configured to send all the clients of the first blockchain to all rooms of the live platform, so that each client receives the first blockchain and generates a second blockchain, and the A second blockchain is sent to the server;
  • a receiving module configured to receive all second blockchains returned by all clients
  • a first determining module configured to determine, in all the second blockchains, that the same second blockchain has the largest number of legal second blockchains, and the other is an illegal second blockchain;
  • the second determining module is configured to determine that the client corresponding to the legal second blockchain is a legitimate client, and the client corresponding to the illegal second blockchain is an illegal client.
  • server further includes:
  • a generating module configured to generate the first blockchain before the sending module sends the first blockchain to all clients in all rooms of the live platform.
  • first blockchain and the second blockchain have the same data structure
  • the data structure includes a block number of the blockchain, a hash value of the previous blockchain, and a current time
  • the timestamp and the blockchain function data, the blockchain function data is random data randomly generated by the server, or data obtained by encrypting and generating a fixed data.
  • the second determining module is further configured to:
  • the server receives a second blockchain sent by the target client that does not have the live platform target room in all the second blockchains returned by the client, and the target client is still in the target room And determining that the target client is an illegal client.
  • the second determining module is specifically configured to:
  • the present invention also provides a server, comprising: a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein when the processor executes the computer program
  • a server comprising: a memory, a processor, and a computer program stored on the memory and operable on the processor, wherein when the processor executes the computer program
  • the present invention further provides a computer readable storage medium having stored thereon a computer program, the program being implemented by the processor to implement the method of any of the first aspects.
  • the first blockchain is sent by the server to all the clients in all rooms of the live broadcast platform, so that each client receives the first blockchain and generates a second blockchain, and the second block is generated.
  • the chain is sent to the server; the server receives all the second blockchains returned by all the clients; the server determines in all the second blockchains that the second largest blockchain has the largest number of legal second blockchains, and the others are The illegal second blockchain; the server determines that the client corresponding to the legal second blockchain is a legitimate client, and the client corresponding to the illegal second blockchain is an illegal client.
  • the server after the server sends the first blockchain, the value of the new blockchain calculated by the legal client is the same, so the server passes the received new blockchain reported by the client.
  • FIG. 1 is a schematic diagram of an embodiment of a data verification method in an embodiment of the present invention.
  • FIG. 2 is a schematic diagram of another embodiment of a data verification method in an embodiment of the present invention.
  • FIG. 3 is a schematic view showing an embodiment of S103 in the embodiment shown in Figure 1;
  • FIG. 4 is a schematic diagram of an embodiment of a server in an embodiment of the present invention.
  • FIG. 5 is a schematic diagram of another embodiment of a server in an embodiment of the present invention.
  • FIG. 6 is a schematic diagram of another embodiment of a server in an embodiment of the present invention.
  • an embodiment of a data verification method in an embodiment of the present invention includes:
  • the server sends the first blockchain to all clients in all rooms of the live platform, so that each client receives the first blockchain, generates a second blockchain, and sends the second blockchain to server;
  • the server is the server corresponding to the live broadcast platform
  • the client may be a user terminal, such as a smart terminal such as a mobile phone or a tablet computer.
  • the target room is a live broadcast room established by the anchor on the live broadcast platform, and the target client is to enter the target live broadcast. Between the clients.
  • Blockchain is a kind of time A chained data structure in which data blocks are combined in a sequential manner, and cryptographically guaranteed non-tamperable and unforgeable distributed ledgers.
  • the server receives all second blockchains returned by all clients.
  • the second blockchain is generated in step S101, after the client in the target room receives the first blockchain.
  • the server determines, in all the second blockchains, that the second largest blockchain is the legal second blockchain, and the other is the illegal second blockchain.
  • the server determines that the client corresponding to the legal second blockchain is a legitimate client, and the client corresponding to the illegal second blockchain is an illegal client.
  • the first blockchain is sent by the server to all the clients in all rooms of the live broadcast platform, so that each client receives the first blockchain and generates a second blockchain, and the second block is generated.
  • the chain is sent to the server; the server receives all the second blockchains returned by all the clients; the server determines in all the second blockchains that the second largest blockchain has the largest number of legal second blockchains, and the others are The illegal second blockchain; the server determines that the client corresponding to the legal second blockchain is a legitimate client, and the client corresponding to the illegal second blockchain is an illegal client.
  • the server after the server sends the first blockchain, the value of the new blockchain calculated by the legal client is the same, so the server passes the received new blockchain reported by the client.
  • the method in the embodiment of the present invention may further include:
  • the server generates the first blockchain.
  • the first blockchain and the second blockchain may have the same number According to the structure; the data structure may include a block number of the blockchain, a hash value of the previous blockchain, a timestamp of the current time, and blockchain function data, and the blockchain function data is randomly generated by the server. Random data, or data obtained by encrypting and generating a fixed data.
  • the data structure of the first blockchain may be the data structure described above, and the first blockchain may include the first blockchain.
  • the block number, the hash value of the previous blockchain, the timestamp of the current time, and the blockchain function data, the blockchain function data is random data randomly generated by the server, or is encrypted after generating a fixed data. Fill the resulting data.
  • the foregoing data structure is specifically implemented as follows:
  • index is used to indicate the block number of the blockchain, usually starting from 0; previousHash represents the HASH value of the previous blockchain; timestamp represents the current timestamp; data represents the splicing of some data (ie the above blockchain function) Data), the content of this data field is designed according to the functions required by the blockchain.
  • the blockchain function data data can be a random data generated by the server, this data is for all customers. The same value is used on both ends. This value is populated when the server initializes. This value is taken directly when the client generates a new blockchain.
  • the hash indicates the hash value of the current blockchain content.
  • the first blockchain may be an initial blockchain generated by the server.
  • the initial blockchain is the first generated blockchain
  • the initial The block number of the blockchain is 0, the timestamp is the current time, the hash value of the previous blockchain is 0, and the blockchain function data (the above data data) is randomly generated by the server, and the server generates a fixed data. Filled after encryption.
  • an algorithm for generating a new blockchain in a blockchain is simultaneously designed.
  • the initial blockchain (such as the first blockchain) is generated by the server, and the server is sent to each target of the live broadcast platform.
  • the client of the room, then the client of the target room receives the initial blockchain and needs an algorithm to generate the next blockchain.
  • the specific implementation is as follows: First, the data structure of the previous blockchain has been obtained, and the next blockchain is generated according to the data of the previous blockchain.
  • the block number of the new blockchain is the current block number plus one.
  • Newblock.timestamp prevblock.time
  • the timestamp of the new blockchain uses the timestamp of the previous blockchain, because if the current time is used, the time acquired by each client may be inconsistent, resulting in the final calculated hash. Inconsistent values eventually result in legitimate clients not getting an equal blockchain based on the same blockchain.
  • the hash value of the previous blockchain of the new blockchain is the hash value of the previous blockchain obtained.
  • the data of the new blockchain is randomly generated by the server, and the padding is data of the blockchain sent by the server.
  • the server may also classify different live rooms, for example, according to the section, and different sections are filled with different random values (blockchain function data), so that different versions are performed.
  • Blockchain function data the blockchain of the client below the room corresponding to each section The data is definitely the same, which prevents the room from being less popular, and can prevent this special situation if you brush a large number of fake clients.
  • the blockchain function data can also use the same random value for all rooms.
  • Newblock.hash HASH(index+previousHash+timestamp+data);
  • the hash value of the new blockchain is the index field with the new blockchain and the previousHash field and the timestamp field and the data field.
  • the hash (HASH) algorithm corresponding to the hash value is unified, and the HASH algorithm may be the SHA-256 algorithm, and may be other HASH algorithms, such as SHA-1, etc., which is not limited herein.
  • the data verification method may further include: if the server receives all the second blockchains returned by all the clients, and the second client sent by the target client that does not have the live platform target room A blockchain, and the target client is still in the target room, determining that the target client is an illegal client. This is because some popular clients do not realize that there is a new blockchain check, and the normal client will report the new blockchain, so it can be directly determined that the second block is not returned. The target client of the chain is an illegal client.
  • the foregoing step S103 may specifically include:
  • S1031 The server takes each second blockchain in all the second blockchains as a value
  • S1032 The server determines that the most-numbered value of all the values is a legal value, and determines the second blockchain corresponding to the legal value as a legal second blockchain, and the other is an illegal second blockchain.
  • the server after the server sends the first blockchain, the value of the new second blockchain calculated by the legitimate client is the same, and the server receives the new second blockchain reported by the client.
  • the server To pass the principle of majority obeying a few, that the same number of new second blockchains is the correct second blockchain, while the lesser ones are considered illegal second blockchains, making the server It is not necessary to check the validity of the second blockchain reported by each client, which greatly reduces the service.
  • the calculation pressure of the server the server does not need to calculate, only need to quantitatively distribute the results of the second blockchain to determine the legal block, and also utilize the core idea of the blockchain, the minority obeys the majority, decentralizes thought of.
  • Embodiments of the server in the embodiment of the present invention are described below.
  • FIG. 4 it is a schematic diagram of an embodiment of a server according to an embodiment of the present invention.
  • the server includes:
  • the sending module 401 is configured to send all the clients of the first blockchain to all rooms of the live platform, so that each client receives the first blockchain and generates a second blockchain, and the a second blockchain is sent to the server;
  • the receiving module 402 is configured to receive all second blockchains returned by all clients;
  • a first determining module 403 configured to determine, in all the second blockchains, that the same second blockchain has the largest number of legal second blockchains, and the other is an illegal second blockchain;
  • the second determining module 404 is configured to determine that the client corresponding to the legal second blockchain is a legitimate client, and the client corresponding to the illegal second blockchain is an illegal client.
  • the server further includes:
  • the generating module 405 is configured to generate the first blockchain before the sending module sends the first blockchain to all clients in all rooms of the live platform.
  • first blockchain and the second blockchain have the same data structure
  • the data structure includes a block number of a blockchain, a hash value of a previous block chain, a timestamp of a current time, and blockchain function data, where the blockchain function data is random data randomly generated by the server. Or the data obtained by encrypting after generating a fixed data encryption.
  • the second determining module 404 is further configured to:
  • the server receives a second blockchain sent by the target client that does not have the live platform target room in all the second blockchains returned by the client, and the target client is still in the target room And determining that the target client is an illegal client.
  • the second determining module 404 is specifically configured to:
  • a server is also provided in the embodiment of the present invention. Referring to FIG. 6, the server includes:
  • the memory 601 is a processor 602 and a computer program 603 stored on the memory and operable on the processor, wherein the data verification method can be implemented when the processor 602 executes the computer program 603.
  • servers involved in the present application include, but are not limited to, mobile terminals (mobile phones, smart phones, PADs, notebook computers, etc.), fixed terminals (computers).
  • the memory 601 can be used to store a computer program 603 comprising software programs, modules and data, and the processor 602 executes the computer program 603 stored in the memory 601 by execution to perform various functional applications and data processing of the server.
  • the memory 601 can be used to store software programs and modules, and the processor 602 executes various functional applications and data processing of the server by running software programs and modules stored in the memory 601.
  • the memory 601 may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application required for at least one function (for example, a game application, a chat application), and the like; and the storage data area may be stored. Data created based on the use of the server (game configuration data, audio data), and the like.
  • the memory 601 may include a high speed random access memory, and may also include a nonvolatile memory such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
  • the processor 602 is the control center of the server, and connects various parts of the entire server using various interfaces and lines, by executing or executing software programs and/or modules stored in the memory 601, and calling data stored in the memory 601, executing The server's various functions and processing data to monitor the server as a whole.
  • the processor 602 may include one or more processing units; preferably, the processor 602 may integrate an application processor, where the application processor mainly processes an operating system, a user interface, an application, and the like.
  • the embodiment of the present invention further provides a computer readable storage medium, wherein the computer readable storage medium can store a program, and the program includes some or all of the steps of the data verification method described in the foregoing method embodiments.
  • the disclosed system, apparatus, and method may be implemented in other manners.
  • the device embodiments described above are merely illustrative.
  • the division of the unit is only a logical function division.
  • there may be another division manner for example, multiple units or components may be combined or Can be integrated into another system, or some features can be ignored or not executed.
  • the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
  • the units described as separate components may or may not be physically separated, and the components displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed to multiple network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of the embodiment.
  • each functional unit in each embodiment of the present invention may be integrated into one processing unit, or each unit may exist physically separately, or two or more units may be integrated into one unit.
  • the above integrated unit can be implemented in the form of hardware or in the form of a software functional unit.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as a standalone product, may be stored in a computer readable storage medium.
  • the technical solution of the present invention which is essential or contributes to the prior art, or all or part of the technical solution, may be embodied in the form of a software product stored in a storage medium.
  • a number of instructions are included to cause a computer device (which may be a personal computer, server, or network device, etc.) to perform all or part of the steps of the methods described in various embodiments of the present invention.
  • the foregoing storage medium includes: a U disk, a mobile hard disk, a read-only memory (ROM), a random access memory (RAM), a magnetic disk, or an optical disk, and the like. .

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Graphics (AREA)
  • Multimedia (AREA)
  • Software Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明实施例公开了一种数据校验方法及服务器。本发明实施例方法包括:通过服务器下发第一区块链到直播平台所有房间的所有客户端,以使得每个客户端收到第一区块链后生成第二区块链,并将第二区块链发送到服务器;服务器接收所有客户端返回的所有第二区块链;服务器在所有第二区块链中,确定相同第二区块链数量最多的为合法的第二区块链,其它为非法的第二区块链;服务器确定合法的第二区块链对应的客户端为合法客户端,非法的第二区块链对应的客户端为非法客户端。本发明实施例中服务器并不需要对每个客户端上报的区块链进行合法性校验,极大的减去了服务器的计算压力,实现少数服从多数,去中心化的思想。

Description

一种数据校验方法及服务器 技术领域
本发明涉及视频直播技术领域,特别涉及一种数据校验方法及服务器。
背景技术
目前,随着网络通信技术的进步和宽带网络的提速,网络直播得到了越来越多的发展和应用。尤其在游戏直播领域,越来越多的观众会观看游戏主播的直播。
而部分主播会通过刷人气的方法来提高房间同时观看的观众数量,从而获取收益。其刷人气的具体的实现方式则是在一台性能非常好的服务器上,通过破解直播平台的网络协议,同时伪造大量的虚假客户端用户同时登陆到直播间,从而伪造大量观众的方法,来将直播间的人气数据刷的比较高。
因此对于直播平台则需要一种方法能够检测出该直播间是否存在伪造虚假客户端大量刷人气的情况。
发明内容
本发明实施例提供了一种数据校验方法及服务器,以检测直播间伪造虚假客户端刷人气的情况。
第一方面,本申请提供了一种数据校验方法,该方法包括:
服务器下发第一区块链到直播平台所有房间的所有客户端,以使得每个客户端收到所述第一区块链后生成第二区块链,并将所述第二区块链发送到所述服务器;
所述服务器接收所有客户端返回的所有第二区块链;
所述服务器在所有第二区块链中,确定相同第二区块链数量最多的为合法的第二区块链,其它为非法的第二区块链;
所述服务器确定合法的第二区块链对应的客户端为合法客户端,非法的第二区块链对应的客户端为非法客户端。
进一步的,在所述服务器下发第一区块链到直播平台所有房间的所有客 户端之前,所述方法还包括:
所述服务器生成所述第一区块链。
进一步的,所述第一区块链和所述第二区块链具有相同的数据结构;
所述数据结构包括区块链的块号、前一个区块链的哈希值、当前时间的时间戳以及区块链功能数据,所述区块链功能数据为所述服务器随机生成的随机数据,或者为生成一个固定数据加密后填充得到的数据。
进一步的,所述方法还包括:
若所述服务器接收所有客户端返回的所有第二区块链中没有所述直播平台目标房间的目标客户端发送的第二区块链,且所述目标客户端当前仍在所述目标房间内,则确定所述目标客户端为非法客户端。
进一步的,所述服务器在所有第二区块链中,确定相同第二区块链数量最多的为合法的第二区块链,其它为非法的第二区块链的步骤,包括:
所述服务器将所有第二区块链中每个第二区块链作为一个数值;
所述服务器确定所有数值中数量最多的数值为合法数值,将合法数值对应的第二区块链确定为合法的第二区块链,其它为非法的第二区块链。
第二方面,本申请提供一种服务器,该服务器包括:
发送模块,用于下发第一区块链到直播平台所有房间的所有客户端,以使得每个客户端收到所述第一区块链后生成第二区块链,并将所述第二区块链发送到所述服务器;
接收模块,用于接收所有客户端返回的所有第二区块链;
第一确定模块,用于在所有第二区块链中,确定相同第二区块链数量最多的为合法的第二区块链,其它为非法的第二区块链;
第二确定模块,用于确定合法的第二区块链对应的客户端为合法客户端,非法的第二区块链对应的客户端为非法客户端。
进一步的,所述服务器还包括:
生成模块,用于在所述发送模块下发第一区块链到直播平台所有房间的所有客户端之前,生成所述第一区块链。
进一步的,所述第一区块链和所述第二区块链具有相同的数据结构;
所述数据结构包括区块链的块号、前一个区块链的哈希值、当前时间的 时间戳以及区块链功能数据,所述区块链功能数据为所述服务器随机生成的随机数据,或者为生成一个固定数据加密后填充得到的数据。
进一步的,所述第二确定模块还用于:
若所述服务器接收所有客户端返回的所有第二区块链中没有所述直播平台目标房间的目标客户端发送的第二区块链,且所述目标客户端当前仍在所述目标房间内,则确定所述目标客户端为非法客户端。
进一步的,所述第二确定模块具体用于:
将所有第二区块链中每个第二区块链作为一个数值,确定所有数值中数量最多的数值为合法数值,将合法数值对应的第二区块链确定为合法的第二区块链,其它为非法的第二区块链。
第三方面,本发明还提供一种服务器,包括:存储器,处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时可以实现第一方面中任一所述的方法。
第四方面,本发明还提供一种计算机可读存储介质,其上存储有计算机程序,该程序被处理器执行时实现第一方面中任一所述的方法。
本发明实施例通过服务器下发第一区块链到直播平台所有房间的所有客户端,以使得每个客户端收到第一区块链后生成第二区块链,并将第二区块链发送到服务器;服务器接收所有客户端返回的所有第二区块链;服务器在所有第二区块链中,确定相同第二区块链数量最多的为合法的第二区块链,其它为非法的第二区块链;服务器确定合法的第二区块链对应的客户端为合法客户端,非法的第二区块链对应的客户端为非法客户端。本发明实施例中服务器下发第一区块链后,合法的客户端计算得到的新的区块链数值是一样的,因此服务器通过收到的客户端上报的新的区块链,来通过多数服从少数的原则,认为相同的新的区块链的数量最大的是合法的区块链,而量偏少的则认为是非法的区块链,使得服务器并不需要对每个客户端上报的区块链进行合法性校验,极大的减去了服务器的计算压力,服务器只需要对区块链的结果进行数量分布以确定出合法的区块链,实现少数服从多数,去中心化的思想。
附图说明
图1是本发明实施例中数据校验方法的一个实施例示意图;
图2是本发明实施例中数据校验方法的另一个实施例示意图;
图3是图1所示实施例中S103的一个实施例示意图;
图4是本发明实施例中服务器的一个实施例示意图;
图5是本发明实施例中服务器的另一个实施例示意图;
图6是本发明实施例中服务器的另一个实施例示意图。
具体实施方式
为了使本技术领域的人员更好地理解本发明方案,下面将结合本发明实施例中的附图,对本发明实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本发明一部分的实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员在没有做出创造性劳动前提下所获得的所有其他实施例,都应当属于本发明保护的范围。
本发明的说明书和权利要求书及上述附图中的术语“第一”、“第二”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”和“具有”以及他们的任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、***、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
请参阅图1,本发明实施例中数据校验方法的一个实施例包括:
S101、服务器下发第一区块链到直播平台所有房间的所有客户端,以使得每个客户端收到第一区块链后生成第二区块链,并将第二区块链发送到服务器;
本实施例中,服务器即即直播平台对应的服务器,客户端可以是用户终端,例如手机、平板电脑等智能终端,目标房间为直播平台上主播建立的直播间,目标客户端为进入该目标直播间的客户端。区块链是一种按照时间顺 序将数据区块以顺序相连的方式组合成的一种链式数据结构,并以密码学方式保证的不可篡改和不可伪造的分布式账本。
S102、服务器接收所有客户端返回的所有第二区块链;
具体的,该第二区块链即为步骤S101中,目标房间各客户端在接收到第一区块链后生成的。
S103、服务器在所有第二区块链中,确定相同第二区块链数量最多的为合法的第二区块链,其它为非法的第二区块链;
由于整个直播平台的用户中,合法用户一定是超过非法用户的,那么可以认定最终上报到服务器的第二区块链的数值正确的数量应该是最多的,从而其他值的第二区块链则是非法的。
S104、服务器确定合法的第二区块链对应的客户端为合法客户端,非法的第二区块链对应的客户端为非法客户端。
本发明实施例通过服务器下发第一区块链到直播平台所有房间的所有客户端,以使得每个客户端收到第一区块链后生成第二区块链,并将第二区块链发送到服务器;服务器接收所有客户端返回的所有第二区块链;服务器在所有第二区块链中,确定相同第二区块链数量最多的为合法的第二区块链,其它为非法的第二区块链;服务器确定合法的第二区块链对应的客户端为合法客户端,非法的第二区块链对应的客户端为非法客户端。本发明实施例中服务器下发第一区块链后,合法的客户端计算得到的新的区块链数值是一样的,因此服务器通过收到的客户端上报的新的区块链,来通过多数服从少数的原则,认为相同的新的区块链的数量最大的是合法的区块链,而量偏少的则认为是非法的区块链,使得服务器并不需要对每个客户端上报的区块链进行合法性校验,极大的减去了服务器的计算压力,服务器只需要对区块链的结果进行数量分布以确定出合法的区块链,实现少数服从多数,去中心化的思想。
如图2所示,在所述服务器下发第一区块链到直播平台所有房间的所有客户端之前,本发明实施例中方法还可以进一步包括:
S105、服务器生成所述第一区块链。
本发明实施例中,所述第一区块链和所述第二区块链可以具有相同的数 据结构;该数据结构可以包括区块链的块号、前一个区块链的哈希值、当前时间的时间戳以及区块链功能数据,所述区块链功能数据为所述服务器随机生成的随机数据,或者为生成一个固定数据加密后填充得到的数据,此时,该第一区块链的数据结构可以是上述描述的数据结构,该第一区块链可以包括第一区块链的块号、前一个区块链的哈希值、当前时间的时间戳以及区块链功能数据,该区块链功能数据为所述服务器随机生成的随机数据,或者为生成一个固定数据加密后填充得到的数据。本发明实施例中,上述数据结构具体实现如下:
Struct BlockData{
Int64 index;
String previousHash;
Int64 timestamp;
String data;
String hash;
}
其中,index用来表示区块链的块号,通常从0开始递增;previousHash表示前一个区块链的HASH值;timestamp表示当前时间戳;data则表示一些数据的拼接(即上述区块链功能数据),这个data字段的内容则是依据区块链所需要完成的功能所设计,针对于本文的检测所有房间人气,区块链功能数据data可以是服务器随机生成一段数据,此数据对所有客户端都使用同样的值,服务器初始化时填充此值,客户端生成新的区块链时则直接取此值;hash则表示当前这个区块链的内容的hash值。有了这个区块链的设计后,当服务器收到客户端新产生的区块链后,则可以通过对里面的数据进行校验,以判断其合法性。
本发明实施例中,第一区块链可以是服务器生成的初始区块链,当第一区块链为初始区块链时,初始区块链由于是第一个生成的区块链,初始区块链的区块号为0,时间戳则为当前时间,上一个区块链的hash值为0,区块链功能数据(上述data数据)则为服务器进行随机生成,服务器生成一个固定数据加密后填充得到。
本发明实施例中同时设计了区块链中新区块链生成的算法,首先初始的区块链(如第一区块链)是服务器生成的,服务器会下发到每个登陆到直播平台目标房间的客户端,那么该目标房间的客户端收到初始区块链后,需要算法来生成下一个区块链。具体实现如下:首先已经获取到了上一个区块链的数据结构,下一个区块链则是依据上一个区块链的数据进行生成。
本发明实施例中,假设上一个区块链的名字是prevblock,新生成的区块链的名字是newblock,具体生成新的区块链的过程如下:
(1)计算新的区块链的区块号。
Newblock.index=prevblock.index+1;
即新的区块链的块号是当前块号加1。
(2)计算新的区块链的时间戳。
Newblock.timestamp=prevblock.time;
本发明实施例中,新区块链的时间戳则使用上一个区块链的时间戳,因为如果使用当前的时间,则可能会造成每个客户端获取到的时间不一致,从而导致最终计算的hash值不一致,最终导致合法的客户端根据相同的区块链得不到一个结果相等的区块链。
(3)计算新的区块链的上一个区块链的hash值。
Newblock.previousHash=prevblock.hash;
其中,新区块链的上一个区块链的hash值则是获取的上一个区块链的hash值。
(4)计算新的区块链的区块链功能数据。
Newblock.data=prevblock.data;
新区块链的data数据则是由服务器来随机生成的,则填充是数据是服务器下发的区块链的数据,本发明实施例中之所以这样设计是为了达到最终生成的新的区块链值是一样的,如果是填房间号或者用户uid,那么最终会导致每个客户端的新的区块链全部都不一样。
当然,本发明实施例中,服务器也可以对不同的直播房间进行分类,例如按照板块来分类,不同的板块填入不一样的随机值(区块链功能数据),这样对不同的版本来进行校验,每个板块对应的房间下面的客户端的区块链 数据则肯定是一样的,这样可以防止对于人气比较少的房间,如果刷大量的虚假客户端,可以防止这种特殊情况。在本发明一些实施例中,区块链功能数据也可以对所有房间都使用同样一个随机值。
(5)计算新的区块链的hash值。
Newblock.hash=HASH(index+previousHash+timestamp+data);
其中,新区块链的hash值则是有新区块链的index字段和previousHash字段和timestamp字段和data字段。
本发明实施例中,哈希值对应的哈希(HASH)算法统一,该HASH算法可以是SHA-256算法,当然也可以是其他HASH算法,例如SHA-1等,此处不作限定。
至此,通过上述步骤就实现了通过一个区块链生成一个新的区块链的算法。而本发明实施例中,客户端通过接收第一区块链生成第二区块链时,即采用上述步骤实现。
另外,本发明实施例中,该数据校验方法还可以进一步包括:若所述服务器接收所有客户端返回的所有第二区块链中没有所述直播平台目标房间的目标客户端发送的第二区块链,且所述目标客户端当前仍在所述目标房间内,则确定所述目标客户端为非法客户端。这样是由于有的刷人气的客户端并没有觉察到有新增一条区块链校验,而正常的客户端则都会进行上报新的区块链,因此可以直接确定该未返回第二区块链的目标客户端为非法客户端。
在本发明一些实施例中,如图3所示,上述步骤S103具体可以包括:
S1031、服务器将所有第二区块链中每个第二区块链作为一个数值;
S1032、服务器确定所有数值中数量最多的数值为合法数值,将合法数值对应的第二区块链确定为合法的第二区块链,其它为非法的第二区块链。
本实施例中,服务器下发第一区块链后,合法的客户端计算得到的新的第二区块链数值是一样的,服务器通过收到的客户端上报的新的第二区块链,来通过多数服从少数的原则,认为相同的新的第二区块链的数量最大的是正确的第二区块链,而量偏少的则认为是非法的第二区块链,使得服务器并不需要对每个客户端上报的第二区块链进行合法性校验,极大的减去了服 务器的计算压力,服务器不需要进行计算,只需要对第二区块链的结果进行数量分布以确定出合法的区块,也利用了区块链的核心思想,少数服从多数,去中心化的思想。
下面介绍本发明实施例中服务器的实施例。
请参阅图4,为本发明实施例中服务器的一个实施例示意图,该服务器包括:
发送模块401,用于下发第一区块链到直播平台所有房间的所有客户端,以使得每个客户端收到所述第一区块链后生成第二区块链,并将所述第二区块链发送到所述服务器;
接收模块402,用于接收所有客户端返回的所有第二区块链;
第一确定模块403,用于在所有第二区块链中,确定相同第二区块链数量最多的为合法的第二区块链,其它为非法的第二区块链;
第二确定模块404,用于确定合法的第二区块链对应的客户端为合法客户端,非法的第二区块链对应的客户端为非法客户端。
进一步的,如图5所示,所述服务器还包括:
生成模块405,用于在所述发送模块下发第一区块链到直播平台所有房间的所有客户端之前,生成所述第一区块链。
进一步的,所述第一区块链和所述第二区块链具有相同的数据结构;
所述数据结构包括区块链的块号、前一个区块链的哈希值、当前时间的时间戳以及区块链功能数据,所述区块链功能数据为所述服务器随机生成的随机数据,或者为生成一个固定数据加密后填充得到的数据。
进一步的,所述第二确定模块404还用于:
若所述服务器接收所有客户端返回的所有第二区块链中没有所述直播平台目标房间的目标客户端发送的第二区块链,且所述目标客户端当前仍在所述目标房间内,则确定所述目标客户端为非法客户端。
进一步的,所述第二确定模块404具体用于:
将所有第二区块链中每个第二区块链作为一个数值,确定所有数值中数量最多的数值为合法数值,将合法数值对应的第二区块链确定为合法的第二区块链,其它为非法的第二区块链。
本发明实施例中还提供一种服务器,请参见图6,所述服务器包括:
存储器601,处理器602及存储在所述存储器上并可在所述处理器上运行的计算机程序603,其中,所述处理器602执行所述计算机程序603时可以实现上述数据校验方法。
需要说明的是,本申请涉及的服务器包括但不限于是:移动终端(手机、智能手机、PAD、笔记本电脑等等)、固定终端(计算机)。
为了便于说明,仅示出了与本发明实施例相关的部分,具体技术细节未揭示的,请参照本发明实施例方法部分。存储器601可用于存储计算机程序603,上述计算机程序包括软件程序、模块和数据,处理器602通过运行执行存储在存储器601的计算机程序603,从而执行服务器的各种功能应用以及数据处理。
在具体的实施过程中,存储器601可用于存储软件程序以及模块,处理器602通过运行存储在存储器601的软件程序以及模块,从而执行服务器的各种功能应用以及数据处理。存储器601可主要包括存储程序区和存储数据区,其中,存储程序区可存储操作***、至少一个功能所需的应用程序(例如游戏类应用程序、聊天类应用程序)等;存储数据区可存储根据服务器的使用所创建的数据(游戏配置数据、音频数据)等。此外,存储器601可以包括高速随机存取存储器,还可以包括非易失性存储器,例如至少一个磁盘存储器件、闪存器件、或其他易失性固态存储器件。处理器602是服务器的控制中心,利用各种接口和线路连接整个服务器的各个部分,通过运行或执行存储在存储器601内的软件程序和/或模块,以及调用存储在存储器601内的数据,执行服务器的各种功能和处理数据,从而对服务器进行整体监控。可选的,处理器602可包括一个或多个处理单元;优选的,处理器602可集成应用处理器,其中,应用处理器主要处理操作***、用户界面和应用程序等。
本发明实施例还提供一种计算机可读存储介质,其中,该计算机可读存储介质可存储有程序,该程序执行时包括上述方法实施例中记载的数据校验方法的部分或全部步骤。
所属领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描 述的***,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
在本申请所提供的几个实施例中,应该理解到,所揭露的***,装置和方法,可以通过其它的方式实现。例如,以上所描述的装置实施例仅仅是示意性的,例如,所述单元的划分,仅仅为一种逻辑功能划分,实际实现时可以有另外的划分方式,例如多个单元或组件可以结合或者可以集成到另一个***,或一些特征可以忽略,或不执行。另一点,所显示或讨论的相互之间的耦合或直接耦合或通信连接可以是通过一些接口,装置或单元的间接耦合或通信连接,可以是电性,机械或其它的形式。
所述作为分离部件说明的单元可以是或者也可以不是物理上分开的,作为单元显示的部件可以是或者也可以不是物理单元,即可以位于一个地方,或者也可以分布到多个网络单元上。可以根据实际的需要选择其中的部分或者全部单元来实现本实施例方案的目的。
另外,在本发明各个实施例中的各功能单元可以集成在一个处理单元中,也可以是各个单元单独物理存在,也可以两个或两个以上单元集成在一个单元中。上述集成的单元既可以采用硬件的形式实现,也可以采用软件功能单元的形式实现。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本发明的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本发明各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(ROM,Read-Only Memory)、随机存取存储器(RAM,Random Access Memory)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,以上实施例仅用以说明本发明的技术方案,而非对其限制;尽管参照前述实施例对本发明进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其 中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本发明各实施例技术方案的精神和范围。

Claims (10)

  1. 一种数据校验方法,其特征在于,所述方法包括:
    服务器下发第一区块链到直播平台所有房间的所有客户端,以使得每个客户端收到所述第一区块链后生成第二区块链,并将所述第二区块链发送到所述服务器;
    所述服务器接收所有客户端返回的所有第二区块链;
    所述服务器在所有第二区块链中,确定相同第二区块链数量最多的为合法的第二区块链,其它为非法的第二区块链;
    所述服务器确定合法的第二区块链对应的客户端为合法客户端,非法的第二区块链对应的客户端为非法客户端。
  2. 根据权利要求1所述的方法,其特征在于,在所述服务器下发第一区块链到直播平台所有房间的所有客户端之前,所述方法还包括:
    所述服务器生成所述第一区块链。
  3. 根据权利要求1所述的方法,其特征在于,所述第一区块链和所述第二区块链具有相同的数据结构;
    所述数据结构包括区块链的块号、前一个区块链的哈希值、当前时间的时间戳以及区块链功能数据,所述区块链功能数据为所述服务器随机生成的随机数据,或者为生成一个固定数据加密后填充得到的数据。
  4. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    若所述服务器接收所有客户端返回的所有第二区块链中没有所述直播平台目标房间的目标客户端发送的第二区块链,且所述目标客户端当前仍在所述目标房间内,则确定所述目标客户端为非法客户端。
  5. 根据权利要求1所述的方法,其特征在于,所述服务器在所有第二区块链中,确定相同第二区块链数量最多的为合法的第二区块链,其它为非法的第二区块链的步骤,包括:
    所述服务器将所有第二区块链中每个第二区块链作为一个数值;
    所述服务器确定所有数值中数量最多的数值为合法数值,将合法数值对应的第二区块链确定为合法的第二区块链,其它为非法的第二区块链。
  6. 一种服务器,其特征在于,所述服务器包括:
    发送模块,用于下发第一区块链到直播平台所有房间的所有客户端,以使得每个客户端收到所述第一区块链后生成第二区块链,并将所述第二区块链发送到所述服务器;
    接收模块,用于接收所有客户端返回的所有第二区块链;
    第一确定模块,用于在所有第二区块链中,确定相同第二区块链数量最多的为合法的第二区块链,其它为非法的第二区块链;
    第二确定模块,用于确定合法的第二区块链对应的客户端为合法客户端,非法的第二区块链对应的客户端为非法客户端。
  7. 根据权利要求6所述的服务器,其特征在于,所述服务器还包括:
    生成模块,用于在所述发送模块下发第一区块链到直播平台所有房间的所有客户端之前,生成所述第一区块链。
  8. 根据权利要求6所述的服务器,其特征在于,所述第一区块链和所述第二区块链具有相同的数据结构;
    所述数据结构包括区块链的块号、前一个区块链的哈希值、当前时间的时间戳以及区块链功能数据,所述区块链功能数据为所述服务器随机生成的随机数据,或者为生成一个固定数据加密后填充得到的数据。
  9. 根据权利要求6所述的服务器,其特征在于,所述第二确定模块还用于:
    若所述服务器接收所有客户端返回的所有第二区块链中没有所述直播平台目标房间的目标客户端发送的第二区块链,且所述目标客户端当前仍在所述目标房间内,则确定所述目标客户端为非法客户端。
  10. 一种服务器,其特征在于,包括:存储器,处理器及存储在所述存储器上并可在所述处理器上运行的计算机程序,其中,所述处理器执行所述计算机程序时可以实现权利要求1至5任一所述的方法。
PCT/CN2017/108051 2017-09-26 2017-10-27 一种数据校验方法及服务器 WO2019061627A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201710882095.8 2017-09-26
CN201710882095.8A CN107528855A (zh) 2017-09-26 2017-09-26 一种数据校验方法及服务器

Publications (1)

Publication Number Publication Date
WO2019061627A1 true WO2019061627A1 (zh) 2019-04-04

Family

ID=60737340

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2017/108051 WO2019061627A1 (zh) 2017-09-26 2017-10-27 一种数据校验方法及服务器

Country Status (2)

Country Link
CN (1) CN107528855A (zh)
WO (1) WO2019061627A1 (zh)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256353B (zh) * 2018-01-11 2021-01-01 武汉斗鱼网络科技有限公司 一种数据完整性校验方法、装置及客户端
CN110381375B (zh) * 2018-04-13 2022-06-21 武汉斗鱼网络科技有限公司 一种确定盗刷数据的方法、客户端及服务器
CN108830088A (zh) * 2018-04-26 2018-11-16 张莉 一种基于物联网的大数据分析方法及***
CN108924089B (zh) * 2018-05-29 2021-11-09 武汉斗鱼网络科技有限公司 一种客户端设备识别方法、装置及客户端设备
CN110147686A (zh) * 2019-04-18 2019-08-20 阿里巴巴集团控股有限公司 一种个人资产变更记录的存储方法、***、装置及设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106385593A (zh) * 2016-09-14 2017-02-08 武汉斗鱼网络科技有限公司 基于椭圆曲线算法的同时观看直播人数的统计方法及***
CN106385601A (zh) * 2016-09-14 2017-02-08 武汉斗鱼网络科技有限公司 基于多协议验证的同时观看直播人数的统计方法及***
CN106487801A (zh) * 2016-11-03 2017-03-08 江苏通付盾科技有限公司 基于区块链的信息验证方法及装置
CN106533696A (zh) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 基于区块链的身份认证方法、认证服务器及用户终端
CN107086909A (zh) * 2017-03-07 2017-08-22 阿里巴巴集团控股有限公司 身份信息的生成方法和装置、身份审核的方法和装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9973341B2 (en) * 2015-01-23 2018-05-15 Daniel Robert Ferrin Method and apparatus for the limitation of the mining of blocks on a block chain
US10636033B2 (en) * 2016-02-22 2020-04-28 Bank Of America Corporation System for routing of process authorizations and settlement to a user in a process data network
CN105959728B (zh) * 2016-06-27 2019-06-21 武汉斗鱼网络科技有限公司 统计直播平台在线人数的***及其方法
CN106534160B (zh) * 2016-12-02 2020-02-21 江苏通付盾科技有限公司 基于区块链的身份认证方法及***
CN106789985B (zh) * 2016-12-08 2019-11-12 武汉斗鱼网络科技有限公司 基于gpu算法的客户端验证方法及***

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106385593A (zh) * 2016-09-14 2017-02-08 武汉斗鱼网络科技有限公司 基于椭圆曲线算法的同时观看直播人数的统计方法及***
CN106385601A (zh) * 2016-09-14 2017-02-08 武汉斗鱼网络科技有限公司 基于多协议验证的同时观看直播人数的统计方法及***
CN106487801A (zh) * 2016-11-03 2017-03-08 江苏通付盾科技有限公司 基于区块链的信息验证方法及装置
CN106533696A (zh) * 2016-11-18 2017-03-22 江苏通付盾科技有限公司 基于区块链的身份认证方法、认证服务器及用户终端
CN107086909A (zh) * 2017-03-07 2017-08-22 阿里巴巴集团控股有限公司 身份信息的生成方法和装置、身份审核的方法和装置

Also Published As

Publication number Publication date
CN107528855A (zh) 2017-12-29

Similar Documents

Publication Publication Date Title
WO2019061627A1 (zh) 一种数据校验方法及服务器
WO2019061626A1 (zh) 一种数据校验方法及服务器
WO2019061629A1 (zh) 一种数据校验方法及服务器
CN108683747B (zh) 资源获取、分发、下载方法、装置、设备及存储介质
WO2019061598A1 (zh) 一种数据校验方法及客户端
WO2019061628A1 (zh) 一种数据校验方法及服务器
CN108241517B (zh) 一种软件升级方法、客户端及电子设备
CN107426253B (zh) 一种数据校验方法及客户端
CN107801059B (zh) 一种鉴权方法及服务器
WO2019061630A1 (zh) 一种交易核算方法及客户端
WO2016184216A1 (zh) 一种防止盗链的方法、防止盗链的服务器及客户端
CN112600678B (zh) 一种数据处理方法、装置、设备及存储介质
CN108805571B (zh) 数据保护方法、平台、区块链节点、***和存储介质
CN103957436A (zh) 一种基于ott业务的视频防盗链方法
CN112672098B (zh) 一种云视频会议加密方法、装置及***
CN110011950B (zh) 一种视频流地址的鉴权方法及装置
WO2019061597A1 (zh) 一种数据处理方法及服务器
WO2019001083A1 (zh) 一种视频流地址鉴权方法及装置
CN111683090A (zh) 一种基于分布式存储的区块链数字签名方法及装置
CN110912689A (zh) 一种唯一值的生成、验证方法及***
CN111461720A (zh) 基于区块链的身份验证方法、装置、存储介质及电子设备
CN108924089B (zh) 一种客户端设备识别方法、装置及客户端设备
CN112753031A (zh) 媒体内容控制
CN112565656B (zh) 视频通话方法、装置、***、电子设备及存储介质
CN110034922B (zh) 请求处理方法、处理装置以及请求验证方法、验证装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 17927394

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 17927394

Country of ref document: EP

Kind code of ref document: A1