CN-121985158-A - Method, device, equipment, medium and product for processing piracy behavior
Abstract
The disclosure relates to a method, a device, equipment, a medium and a product for processing a piracy, wherein the method is applied to a processing system of the piracy, and the processing system of the piracy comprises an authentication server and a plurality of content distribution networks connected with the authentication server; the method comprises the steps that when any content distribution network receives a file access request sent by a user terminal, an authentication request carrying target user information is sent to an authentication server, the authentication server judges whether the target user information in the authentication request meets a preset blocking strategy, and the authentication server returns interception information representing that a multimedia file cannot be accessed to the content distribution network under the condition that the blocking strategy is met, and the content distribution network intercepts the file requested to be accessed by the user terminal. The method and the device can improve the instantaneity of prohibiting the piracy behavior and can effectively inhibit the piracy behavior.
Inventors
- LI QI
Assignees
- 北京奇艺世纪科技有限公司
Dates
- Publication Date
- 20260505
- Application Date
- 20260313
Claims (12)
- 1.A method for processing the piracy is characterized by being applied to a processing system of the piracy, wherein the processing system of the piracy comprises an authentication server and a plurality of content distribution networks connected with the authentication server, and the method comprises the following steps: when any content distribution network receives a file access request sent by a user terminal, sending an authentication request carrying target user information to the authentication server; judging whether the target user information in the authentication request meets a preset blocking strategy or not by the authentication server; And under the condition that the blocking policy is met, the authentication server returns interception information which characterizes that the file cannot be accessed to the content distribution network, and the content distribution network intercepts the file which the user terminal requests to access.
- 2. The method of claim 1, wherein the determining, by the authentication server, whether the target user information in the authentication request satisfies a preset blocking policy comprises: The authentication server acquires the forbidden user information and the forbidden time period in the forbidden strategy, wherein the forbidden user information is used for representing the forbidden user information, and the user information comprises at least one of a user identifier, a device identifier, a first network protocol IP address when a user accesses a service interface and a second IP address when the user accesses a content distribution network; And if the current time meets the blocking time period and at least one item of the target user information is contained in the blocking user information, determining that the target user information meets the blocking policy.
- 3. The method of claim 1, wherein the determining of the blocking policy comprises: The authentication server acquires access logs of a plurality of content distribution networks within a preset statistical duration range; Extracting key fields in the access log, wherein the key fields comprise a statistical dimension field for representing user information and a key behavior field for representing access behavior information and serving as data to be counted; carrying out aggregation statistics on the key behavior fields based on the statistics dimension fields to obtain statistics results; if the statistical result meets a preset behavior abnormal condition, marking the user information represented by the statistical dimension field as forbidden user information; determining a blocking time period of the blocking user information according to the statistical result; And associating the forbidden user information with the forbidden time period to form a forbidden policy.
- 4. The method of claim 3, wherein aggregating the critical-behavior fields based on the statistical dimension fields to obtain statistics comprises: Under each statistical dimension field, carrying out aggregation statistics on the key behavior fields to obtain a first statistical result; and under the combined dimension field containing at least two statistical dimension fields, carrying out aggregation statistics on the key behavior fields to obtain a second statistical result.
- 5. The method of claim 4, wherein aggregating the critical-behavior fields under a combined dimension field comprising at least two of the statistical dimension fields to obtain a second statistical result comprises: determining a field representing a first IP address when a user accesses a service interface and a field representing a user identifier in the statistical dimension as combined dimension fields; and under the combined dimension field, carrying out aggregation statistics on an operator field to obtain a second statistical result corresponding to the operator field, wherein the operator field is used for representing an Internet service provider carrying region information corresponding to a second IP address when a user accesses a content distribution network.
- 6. The method according to claim 1, wherein when any one of the content distribution networks receives a file access request sent by a user terminal, sending an authentication request carrying target user information to the authentication server, includes: in the synchronous mode, when any content distribution network receives a file access request sent by a user terminal, an authentication request carrying target user information is sent to the authentication server; Or in an asynchronous mode, when any content distribution network receives a file access request sent by a user terminal, according to a file identifier carried in the file access request, sending a file fragment in a target file corresponding to the file identifier to the user terminal, and sending an authentication request carrying target user information to the authentication server.
- 7. The method of claim 6, wherein the intercepting, by the content distribution network, the file requested to be accessed by the user terminal comprises: in the synchronous mode, the content distribution network prohibits the return of the target file to the user terminal; In the asynchronous mode, the content delivery network interrupts the sending of the file segments to the user terminal and prohibits the returning of the target file to the user terminal.
- 8. The method according to claim 1, wherein the method further comprises: The content distribution network sends a target file corresponding to the file identification to the user terminal according to the file identification carried in the file access request under the condition that non-interception information returned by the authentication server is received or the returned information of the authentication server is not received within a preset response time length range; and the authentication server returns non-interception information to the content distribution network under the condition that the target user information is judged not to meet the blocking policy.
- 9. The device is applied to a processing system of the piracy, and comprises an authentication server and a plurality of content distribution networks connected with the authentication server, wherein the device comprises: the authentication request sending module is used for sending an authentication request carrying target user information to the authentication server when any content distribution network receives a file access request sent by a user terminal; The blocking judgment module is used for judging whether the target user information in the authentication request meets a preset blocking strategy or not by the authentication server; And the file interception module is used for returning interception information which characterizes that the file cannot be accessed to the content distribution network by the authentication server under the condition that the blocking policy is met, and intercepting the file which the user terminal requests to access by the content distribution network.
- 10. An electronic device, the electronic device comprising: A processor; A memory for storing the processor-executable instructions; the processor is configured to read the executable instructions from the memory and execute the instructions to implement the method for handling piracy according to any of the preceding claims 1-8.
- 11. A computer readable storage medium, characterized in that instructions are stored in the computer readable storage medium, which instructions, when run on a terminal device, cause the terminal device to implement a method of handling a piracy according to any of claims 1-8.
- 12. A computer program product, characterized in that the computer program product, when run on a computer, causes the computer to implement a method of handling a piracy according to any of claims 1-8.
Description
Method, device, equipment, medium and product for processing piracy behavior Technical Field The disclosure relates to the technical field of video playing, and in particular relates to a method, a device, equipment, a medium and a product for processing a piracy behavior. Background With the development of video playing technology, a third party terminal steals the multimedia file of the target server and provides the multimedia file with a hotlinking playing behavior for users to play. In response to the hotlinking action, the method is mostly dependent on analysis of access logs of the content distribution network and triggering blocking. However, the method has the problems of high log aggregation delay, delayed blocking strategy and the like, has poor real-time performance, and cannot effectively prevent the occurrence of hotlinking playing behaviors. Disclosure of Invention In order to solve the technical problems, the disclosure provides a method, a device, equipment, a medium and a product for processing a piracy behavior. According to one aspect of the present disclosure, there is provided a method for processing a piracy, the method being applied to a processing system of the piracy, the processing system of the piracy including an authentication server and a plurality of content distribution networks connected to the authentication server, the method comprising: when any content distribution network receives a file access request sent by a user terminal, sending an authentication request carrying target user information to the authentication server; judging whether the target user information in the authentication request meets a preset blocking strategy or not by the authentication server; And under the condition that the blocking policy is met, the authentication server returns interception information which characterizes that the file cannot be accessed to the content distribution network, and the content distribution network intercepts the file which the user terminal requests to access. According to another aspect of the present disclosure, there is also provided a device for processing a piracy, the device being applied to a processing system of the piracy, the processing system of the piracy including an authentication server and a plurality of content distribution networks connected to the authentication server, the device including: the authentication request sending module is used for sending an authentication request carrying target user information to the authentication server when any content distribution network receives a file access request sent by a user terminal; The blocking judgment module is used for judging whether the target user information in the authentication request meets a preset blocking strategy or not by the authentication server; And the file interception module is used for returning interception information which characterizes that the file cannot be accessed to the content distribution network by the authentication server under the condition that the blocking policy is met, and intercepting the file which the user terminal requests to access by the content distribution network. According to another aspect of the present disclosure, there is also provided an electronic apparatus including: A processor; A memory for storing the processor-executable instructions; The processor is used for reading the executable instructions from the memory and executing the instructions to realize the processing method of the piracy. According to another aspect of the present disclosure, there is also provided a computer-readable storage medium storing a computer program for executing the above-mentioned method of processing a piracy. According to another aspect of the present disclosure, there is also provided a computer program product, which when run on a computer, causes the computer to implement the above-mentioned method of handling piracy. Compared with the prior art, the technical scheme provided by the embodiment of the disclosure has the following advantages: The technical scheme provided by the embodiment of the disclosure is applied to a processing system of the piracy, and the processing system of the piracy comprises an authentication server and a plurality of content distribution networks connected with the authentication server. Based on the authentication server, after the user terminal initiates the file access request, the authentication request carrying the target user information needs to be sent to the authentication server through the content distribution network. And if so, returning interception information which characterizes that the file cannot be accessed to the content distribution network, and intercepting the file which the user terminal requests to access by the content distribution network. Based on the above, the file access requests of all the content distribution networks in the embodiment need to be authenticated by the authentication server an