Hotlink protection method, device and system based on network terminal

A network terminal and anti-theft link technology, applied in the transmission system, electrical components, etc., can solve the problem of ineffective solution to the hot link problem and the poor effectiveness of the anti-theft link method, and achieve the effect of a safe anti-theft link mechanism and poor solution effectiveness

Inactive Publication Date: 2017-10-24
BEIJING UNION VOOLE TECH
View PDF6 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Therefore, the anti-leeching method of scheme two still cannot effectively solve the hotlinking problem
[0009] Aiming at the problem of poor effectiveness of the anti-leeching method in the technology, no solution has been proposed yet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hotlink protection method, device and system based on network terminal
  • Hotlink protection method, device and system based on network terminal
  • Hotlink protection method, device and system based on network terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0044] Embodiment 1 of the present invention describes an anti-leeching system based on network terminals. In this system, network terminals, media servers, and authentication servers are included. All network terminals and all servers are used as layer 0 components, which can be understood as clients respectively. and server side.

[0045] Among them, the network terminal is a client that responds to user operations to play multimedia, it interacts with the authentication server through the user authentication interface, and obtains playback information from the authentication server; The server obtains the media to be played.

[0046] The authentication server is a server that interacts with the network terminal to return playback information to the network terminal, and the media server is a server that interacts with the network terminal to return the media to be played to the network terminal.

[0047] Further, inside the network terminal, it includes a proxy module, a r...

Embodiment 2

[0055] Embodiment 2 of the present invention describes an anti-leeching method based on a network terminal from the perspective of a network terminal. The network terminal includes a proxy module, a response module for responding to user playback operations, and a player module. The interaction between the servers realizes the response to the user's playback operation, and finally plays the multimedia that the user intends to watch. The focus of this embodiment is to realize anti-leeching during the interaction process. Specifically, as figure 2 As shown, the anti-leech method in this embodiment includes the following steps S202 to S212, and each step is described in detail as follows.

[0056] Step S202: The response module obtains the playing information from the authentication server in response to the user's playing operation.

[0057] The response module can be a client application program installed in the network terminal, such as a browser. When the user wants to play...

Embodiment 3

[0070] Embodiment 3 of the present invention is a preferred embodiment on the basis of Embodiment 2 above. In this preferred embodiment, the network terminal further includes an authentication module. Specifically, such as image 3 As shown, the anti-leech method in this embodiment includes the following steps S302 to S316, and each step is described in detail as follows.

[0071] Step S302: The response module invokes the authentication module in response to the user's playback operation.

[0072] The user performs a playback operation through the response module, and the response module responds by first obtaining the description information of the media to be played corresponding to the playback operation. The description information of the media is used as a parameter, and the authentication module is requested by the HTTP protocol.

[0073] Step S304: The authentication module communicates with the authentication server based on the socket encrypted channel, and obtain...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a hotlink protection method, device and system based on a network terminal. The network terminal comprises an agent module, a response module used for responding to a play operation of a user and a player module. At one side of the network terminal, the hotlink protection method comprises the steps that the response module acquires play information from an authorization server in response to a play operation; the response module receives the play information and starts the player module; the player module acquires a first URL according to the play information; the player module requests the agent module through the first URL; the agent module parses the first URL by adopting a private protocol, and modifies a destination address in the first URL into an address of a media server in which a medium to be played is actually stored; and the agent module requests the media server through the first URL so as to acquire the medium to be played. According to the invention, the security of a hotlink protection mechanism can be enhanced.

Description

technical field [0001] The present invention relates to the technical field of streaming media, in particular to a network terminal-based anti-leech method, device and system. Background technique [0002] Network terminals, including OTT terminals, IPTV terminals, and DVB terminals, can be smart TVs, computers, set-top boxes, PADs, smart phones, and so on. Among them, the application service provided to the network terminal includes video playback. When providing video playback, for the traditional video playback technology, in the playback mode, the entire video file must be downloaded before it can be played. With the development of streaming media technology, this playback mode is gradually changing. [0003] Streaming media refers to media formats, such as audio, video and other multimedia files, that are played continuously and in real time on the network using streaming technology. Streaming media technology is also called streaming media technology. The so-called s...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/1466H04L63/1483H04L67/02
Inventor 马飞刘春瑞白玉成杨守涛刘振敏
Owner BEIJING UNION VOOLE TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products