Live streaming security control of anti-theft chain

Source: Internet
Author: User

The concept of anti-theft chain is mainly from the business of the site, the original definition as long as the text in the content of the site, the picture was illegal use of others, with the gradual enrichment of the content of the site, there has been more music, video, Flash and other aspects of the content, while the technical requirements for the anti-theft chain is also constantly strengthening
The requirements of the video broadcasting service will be more important in this regard, for example, an educational website, the teacher's real-time teaching video, if not authorized by other sites illegally access, on other sites can be arbitrary to watch, which for the operators, it will be a huge loss. If a live concert live, also without authorization, you can be connected to watch, the concert sales will be directly affected. And the content of the live video is often made by a lot of resources, once it is easily embezzled, the harm to the business is obvious.
What is an anti-theft chain
Anti-theft chain is actually the use of server-side programming, through the URL filtering technology to prevent hotlinking software. For example File.abc.com/test.rar this, if does not install the anti-theft chain, others can easily in his website quoted this address. If the server-side programming of this station file.abc.com, for example, by file.abc.com/test.rar?authcode=xxxxxxxxxxxxxxxx& ip=127.0.0.1 bound IP, This link can only be accessed through 127.0.0.1来 and cannot be accessed through other IPs.

Definition of anti-theft chain
This content is not on its own server, and by technical means, bypassing the other end of the advertising interests of the final page, directly on their own ads have an interest in the page to provide this content to the end user. It is often a little-known small website to steal some powerful big website address (such as some music, pictures, software) and then placed in their own website, in this way to steal the space and traffic of large sites.

the Generation   of the anti-theft chain;
        generally we browse a full page on the Internet and not all of them are delivered to the client at once. If the requested page has a picture or other information, then the first HTTP request is the text of the page, and then through the client's browser to interpret the text, if there is a picture, then the client's browser will send another HTTP request, When this request is processed, the image file will be transmitted to the client, and the browser will then place the image in the correct location of the page, so that a complete page can be fully displayed by sending an HTTP request multiple times. Based on this mechanism, there is a hotlinking problem: If a site does not have the picture information on its page, it can be linked to the image information of other websites. In this way, sites that do not have any resources use the resources of other sites to display to the browser, increasing their access, and most of the visitors will not be easily found, so it is obvious to those who have used the resources of the site is not fair. Some bad websites to expand their own site content without increasing costs, often misappropriation of links to other sites. On the one hand damage the legitimate interests of the original website, on the other hand, aggravating the burden of the server.

The implementation of anti-theft chain
To implement the anti-theft chain, we must first understand the implementation principle of hotlinking, mentioned the implementation principle of the anti-theft chain has to start from the HTTP protocol, in the HTTP protocol, there is a header field called Referer, in the format of the URL to indicate from where to link to the current page or file. In other words, through Referer, the Web site can detect the source page of the target page access, and if it is a resource file, it can be traced to the page address where it is displayed. With the Referer tracking source is good to do, at this time can be handled by technical means, once detected source is not the site to block or return to the specified page. If you want to protect your site against theft, you need to treat different situations differently. If the site server is using Apache, then using the Apache URL rewrite feature can easily prevent various hotlinking, the principle is to check the refer, if the refer information from other sites are redirected to the specified image or Web page. If the server is using IIS, you need to use a third-party plug-in to implement the anti-theft chain function, now more commonly used a product called isapi_rewrite, can achieve similar to the Apache anti-theft chain function. In addition, for the Forum can also use "Login verification" method for anti-theft chain.

Austrian point cloud streaming media for the anti-theft chain to do a targeted technical solution, users can be targeted for different scenarios and conditions, the corresponding anti-theft chain processing.

Domain-based anti-theft chain processing

This is the most common practice, from the technical implementation is also the most concise and easy to use, but the shortcomings are more obvious, only suitable for the use of Web page mode, once detached browser, will be limited. At the same time from the technical crack is also relatively easy.

Access based on connection token (token) access via encrypted token

This practice, is to set the specified encryption token for each video source, the user only obtain token, only allow authorization access, suitable for the site page, client, PC, mobile phone use, implementation is relatively simple, but because the token is relatively fixed, once token is known to others, There is also the risk that content sources will be stolen.

Based on release token encryption, combined with authorized service access

Release token authorization, is in the original token authorization mode, did a further enhancement, token every moment in constant random changes, the user must connect to the authorization server, each time access, need to obtain the latest token from the authorization server, before allowing access. This is similar to the bank's personal USB security device, when logging on to the Internet banking, need to obtain a random login password, before you can log in online silver. In this case, if the user cannot connect to the authorization server, it is almost impossible to get the connection token, thereby preventing the possibility of being illegally used. This model also applies to the various access modes for pages, clients, PCs, and mobile phones. The implementation is relatively simple at the same time.

Live streaming security control of anti-theft chain

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.