The invention relates to a method for establishing and verifying a live broadcast link address and a corresponding device

A link address and verification method technology, which is applied in the field of construction and verification methods of live link addresses and corresponding devices, can solve the problems of low universality and adaptability, and the inability to use browsers, so as to prevent hijacking and tampering and improve the effectiveness of anti-theft sexual effect

Inactive Publication Date: 2018-12-18
广东省南方数字电视无线传播有限公司
View PDF7 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the above methods have certain defects in the field of live broadcasting. For example, browser referer authentication requires a browser to complete anti-leeching. However, live video generally has a live broadcast platform or APP, and browser referer authentication cannot be used.
The second and third methods require the user to set up on the client, which is less common and adaptable

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • The invention relates to a method for establishing and verifying a live broadcast link address and a corresponding device
  • The invention relates to a method for establishing and verifying a live broadcast link address and a corresponding device
  • The invention relates to a method for establishing and verifying a live broadcast link address and a corresponding device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0047] see figure 1 , is a flow diagram of an embodiment of a method for establishing a live link address provided by the present invention, the method includes steps 101 to 103, and each step is specifically as follows:

[0048] Step 101: Obtain the IP address of the client and a first key; wherein, the first key is generated by the server to be accessed and sent to the client.

[0049] In this embodiment, the first key is generated by the server to be accessed using a symmetric encryption algorithm and sent to the client. The first key may be generated using symmetric encryption and sent to the client in a secure manner in advance. Wherein, the symmetric encryption algorithm can adopt any one of DES, 3DES, Blowfish, IDEA, RC4, RC5, RC6 and AES, and the symmetric encryption algorithm is not a limitation of the present invention. Alternatively, an asymmetric encryption method is used to generate the public key, and the server sends the public key to the client for storage. Th...

Embodiment 2

[0082] see figure 2 , figure 2 It is a schematic flowchart of an embodiment of the method for verifying the live link address provided by the present invention. like figure 2 As shown, the method includes steps 201 to 203:

[0083] Step 201: Receive an access request sent by a client.

[0084] In this embodiment, the access request includes the third URL address formed by the method for forming a live link address described in Embodiment 1.

[0085] Step 202: extract the requested access address, the IP address to be verified, the third signature parameter and the third identification parameter from the third URL address.

[0086] Step 203: Judging whether the IP address to be verified is consistent with the IP address of the client, if yes, execute step 204, otherwise, execute step 207.

[0087] Step 204: Perform MD5 verification according to the third signature parameter and the preset second key.

[0088] In this embodiment, step 204 specifically includes: after se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for establishing and verifying a live broadcast link address and a corresponding device. The method comprises the following steps: obtaining an IP address of a clientend and a first key, wherein the first key is generated by the server to be accessed and sent to the client; forming a first string according to a first URL address, an IP address and a first key to be requested, encrypting the first string, the encrypted data being taken as a signature parameter; forming a second URL address according to the first URL address, the IP address, the signature parameter and the identification parameter, wherein the identification parameter is obtained by encrypting and encoding the current system time of the client using the first key. The second URL address hasthe capability of anti-theft chain. Compared with the existing anti-theft chain technology, the technical scheme of the invention is more suitable for network live broadcast, so that the anti-theft chain has timeliness, hijacking and tampering are prevented, and the anti-theft effectiveness of the live link address is improved.

Description

technical field [0001] The present invention relates to the field of computer technology, in particular to a method for establishing and verifying a live link address and a corresponding device. Background technique [0002] Hotlinking means that service providers do not provide server content themselves, but directly provide end users with content from other service providers on their own websites through technical means, defrauding end users of their browsing and click-through rates. , such as pictures, audio, video, and files. With the rise of webcasting, the theft of live link addresses is also increasing. Existing anti-theft methods for webpage addresses mainly include: browser referer authentication, client setting IP address blacklist or implementing MD5 signature encryption for link addresses, etc. [0003] However, the above-mentioned methods have certain defects in the field of live broadcasting, such as browser referer authentication, which requires a browser to...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876H04L63/1441H04L63/1466
Inventor 谢长才
Owner 广东省南方数字电视无线传播有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products