Video stream address authentication method and device
A technology of video streaming and authentication, applied in the computer field, can solve the problems of low security and achieve the effect of improving security, solving low security and increasing difficulty
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0064] It should be noted that the method provided in this embodiment is applied to a server, and the server and the client are connected through a network to realize communication; in a specific implementation process, the client can be applied to a mobile terminal device (for example, Mobile phones, tablet computers) can also be applied to fixed terminal devices (such as desktop computers), and there is no restriction here. The server is a server for processing video information, and may be a single server or a server group composed of multiple servers.
[0065] This embodiment provides a method for authenticating video stream addresses, such as figure 1 As shown, the method includes:
[0066] Step S101: Receive login information of the client, and generate first information for authentication according to the login information.
[0067] Specifically, the above-mentioned login information includes user name, password, etc. As a preference, when viewers open the live broadcast room...
Embodiment 2
[0099] This embodiment provides a method for authenticating video stream addresses, such as figure 2 As shown, the method includes:
[0100] Step S201: Send the login information to the server, so that the server generates the first information for authentication according to the login information, and encrypts the first information for authentication to generate the authentication information. Second information
[0101] Step S202: receiving the second information for authentication, decryption information and user authentication information sent by the server;
[0102] Step S203: Obtain a decryption key according to the decryption information, and use the decryption key to decrypt the second information used for authentication to obtain the first information used for authentication.
[0103] In the first embodiment, the method in which the client obtains the first information for authentication by decrypting the information has been described in detail, so it will not be repeated h...
Embodiment 3
[0112] This embodiment provides a device for authenticating video stream addresses. The device is a server, such as image 3 As shown, the above device includes:
[0113] The first receiving module 301 is configured to receive login information of the client, and generate first information for authentication according to the login information;
[0114] The first sending module 302 is configured to encrypt the first information used for authentication, generate second information used for authentication, and send the second information used for authentication to the client, Decryption information and user authentication information, so that the client can obtain a decryption key through the decryption information, and decrypt the second information for authentication through the decryption key to obtain the The first information for authentication;
[0115] The second receiving module 303 is configured to receive the video stream address request information sent by the client, where ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com