By deriving consumption patterns extracted from chunk request data for HLS videos, we are able to identify abusive behavior and ban the offenders who attempt to pirate our content.
Authors:
Burak Bostancioglu
Alex Bekker
7. Solution
❏ Proxy auth per request with per-user
token
❏ Token includes user’s information
Ex:
mign=EEsRFRMGbBcROQZJCUwQKB4HF15YS
kcXBGtZWgNWQ3BHSx8TARpABjcgB0kJXERxW
VtEUFYJQBANPTwCV0xJcl9RS05BXB9BHToGG
WwHF2JRWk9LRFwAVRU%3D
Client
CDN
Auth
Server
S3