Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and device for video stream address

A video streaming and authentication technology, applied in the computer field, can solve the problem of low security and achieve the effect of improving security and increasing difficulty

Active Publication Date: 2019-07-12
WUHAN DOUYU NETWORK TECH CO LTD
View PDF7 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a video stream address authentication method and device to solve the technical problem of low security in the prior art because third-party platforms or hackers can easily obtain video stream address information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and device for video stream address
  • Authentication method and device for video stream address
  • Authentication method and device for video stream address

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0054] It should be noted that the method provided in this embodiment is applied to a client, and the client and the server are connected through a network to realize communication; in the specific implementation process, the client can be applied to a mobile terminal device ( For example, mobile phones, tablet computers), and can also be applied to fixed terminal devices (such as desktop computers), and there is no limitation here.

[0055] This embodiment provides an authentication method for a video stream address, and the method is applied to a client, such as figure 1 As shown, the method includes:

[0056] Step S101: Send login information to the first server and the second server, so that the first server generates first information for authentication and user authentication information based on the login information, and uses a preset encryption key to encrypt the Encrypt the first information used for authentication to generate second information used for authenticat...

Embodiment 2

[0101] This embodiment provides an authentication method for a video stream address, which is applied to the first server, such as figure 2 As shown, the method includes:

[0102] Step S201: receiving the login information of the client, and generating first information for authentication and user authentication information according to the login information, and then encrypting the first information for authentication with a preset encryption key, generating second information for authentication;

[0103] In the first embodiment, it has been introduced in detail that the first server generates the first information for authentication and user authentication information according to the login information of the client, and uses the preset encryption key pair to encrypt the first information for authentication. The specific process of encrypting and generating the second information for authentication will not be repeated here.

[0104] Step S202: Send the second information...

Embodiment 3

[0121] This embodiment provides an authentication method for a video stream address, such as image 3 As shown, the method includes:

[0122] Step S301: receiving the login information of the client;

[0123] Step S302: Send a decryption key to the client based on the login information, so that the client can decrypt the second information for authentication with the decryption key to obtain the first information for authentication , and determine a first authentication value according to the first information used for authentication and user authentication information, combine the user authentication information and the first authentication value to obtain video stream address request information, and Sending the video stream address request information to the first server, and making the first server obtain the first authentication value according to the video stream address request information, and according to the first information used for authentication and the After t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an authentication method and device for a video stream address. The method comprises the following steps: sending login information to a first server and a second server; receiving second information for authentication and the user authentication information sent by the first server; determining a first authentication value according to the first information used for authentication and the user authentication information, and obtaining video stream address request information based on the user authentication information and the first authentication value; and sending the video stream address request information to a first server, determining a second authentication value through the first information for authentication and the user authentication information, judging whether the first authentication value is matched with the second authentication value or not, and if so, authenticating by the client through the video stream address. The method provided by the invention solves the technical problem that the security is low because hackers are easy to obtain video stream address information in the prior art.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a video stream address authentication method and device. Background technique [0002] With the development of HTML technology, HTML5 has become the next-generation HTML standard. At present, most browsers can support HTML5, so new features based on HTML5 are more and more applied to WEB programs, such as for playing live video, etc. . [0003] In the prior art, video playback is also based on HTML5 technology. When the server receives the video stream request from the client, the server will send the video stream address corresponding to the video stream request to the client, so that the client can Play the corresponding video. However, in the video stream playback based on HTML5 technology, the video stream address information is expressed in JavaScript language, and since JavaScript is an explanatory scripting language, the video stream address information in the client b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/06H04L9/32
CPCH04L9/0618H04L9/0643H04L9/3297H04L63/0478H04L63/0815H04L63/0876H04L65/60H04L69/162
Inventor 周志刚张文明陈少杰
Owner WUHAN DOUYU NETWORK TECH CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More