Video stream address authentication method and device

A technology of video streaming and authentication, applied in the computer field, can solve the problems of low security and achieve the effect of improving security, solving low security and increasing difficulty

Active Publication Date: 2018-06-29
WUHAN DOUYU NETWORK TECH CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a video stream address authentication method and device to solve the technical problem of low security in the prior art because hackers can easily obtain video stream address information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Video stream address authentication method and device
  • Video stream address authentication method and device
  • Video stream address authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] It should be noted that the method provided in this embodiment is applied to a server, and the server and the client are connected through a network to realize communication; in a specific implementation process, the client can be applied to a mobile terminal device (for example, Mobile phones, tablet computers) can also be applied to fixed terminal devices (such as desktop computers), and there is no restriction here. The server is a server for processing video information, and may be a single server or a server group composed of multiple servers.

[0065] This embodiment provides a method for authenticating video stream addresses, such as figure 1 As shown, the method includes:

[0066] Step S101: Receive login information of the client, and generate first information for authentication according to the login information.

[0067] Specifically, the above-mentioned login information includes user name, password, etc. As a preference, when viewers open the live broadcast room...

Embodiment 2

[0099] This embodiment provides a method for authenticating video stream addresses, such as figure 2 As shown, the method includes:

[0100] Step S201: Send the login information to the server, so that the server generates the first information for authentication according to the login information, and encrypts the first information for authentication to generate the authentication information. Second information

[0101] Step S202: receiving the second information for authentication, decryption information and user authentication information sent by the server;

[0102] Step S203: Obtain a decryption key according to the decryption information, and use the decryption key to decrypt the second information used for authentication to obtain the first information used for authentication.

[0103] In the first embodiment, the method in which the client obtains the first information for authentication by decrypting the information has been described in detail, so it will not be repeated h...

Embodiment 3

[0112] This embodiment provides a device for authenticating video stream addresses. The device is a server, such as image 3 As shown, the above device includes:

[0113] The first receiving module 301 is configured to receive login information of the client, and generate first information for authentication according to the login information;

[0114] The first sending module 302 is configured to encrypt the first information used for authentication, generate second information used for authentication, and send the second information used for authentication to the client, Decryption information and user authentication information, so that the client can obtain a decryption key through the decryption information, and decrypt the second information for authentication through the decryption key to obtain the The first information for authentication;

[0115] The second receiving module 303 is configured to receive the video stream address request information sent by the client, where ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a video stream address authentication method and device, wherein the method comprises the steps of: receiving the login information of a client side, and generating first information for authentication according to the login information; encrypting the first information for authentication, generating second information for authentication, and sending the second information for authentication, decryption information and user authentication information to the client side; receiving the video stream address request information sent by the client side; obtaining a first authentication value according to the video stream address request information, and determining a second authentication value according to the first information for authentication and the user authentication information; and, judging whether the first authentication value is matched with the second authentication value or not, and if so, enabling the client side to pass video streamaddress authentication. By means of the method provided in the invention, the technical problem that the security is relatively low due to the fact that a hacker easily obtains video stream address information in the prior art can be solved.

Description

Technical field [0001] The invention relates to the field of computer technology, in particular to a method and device for authenticating video stream addresses. Background technique [0002] With the development of HTML technology, HTML5 has become the next generation of HTML standards. At present, most browsers can support HTML5. Therefore, new features based on HTML5 are increasingly applied to WEB programs, such as live video playback, etc. . [0003] In the prior art, video playback is also based on HTML5 technology. When the server receives the video stream request from the client, the server will send the video stream address corresponding to the video stream request to the client, so that the client is based on the above video stream address Play the corresponding video. However, in the video stream playback based on HTML5 technology, the video stream address information is expressed in JavaScript language. Because JavaScript is an explanatory scripting language, the vide...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04N21/254H04N21/258H04N21/266H04N21/4627
CPCH04N21/2541H04N21/25816H04N21/26606H04N21/4627
Inventor 周志刚张文明陈少杰
Owner WUHAN DOUYU NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products