CN105357190A - Method and system for performing authentication on access request - Google Patents

Method and system for performing authentication on access request Download PDF

Info

Publication number
CN105357190A
CN105357190A CN201510703837.7A CN201510703837A CN105357190A CN 105357190 A CN105357190 A CN 105357190A CN 201510703837 A CN201510703837 A CN 201510703837A CN 105357190 A CN105357190 A CN 105357190A
Authority
CN
China
Prior art keywords
access request
authentication
request
server
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510703837.7A
Other languages
Chinese (zh)
Other versions
CN105357190B (en
Inventor
洪珂
林基宏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wangsu Science and Technology Co Ltd
Original Assignee
Wangsu Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wangsu Science and Technology Co Ltd filed Critical Wangsu Science and Technology Co Ltd
Priority to CN201510703837.7A priority Critical patent/CN105357190B/en
Publication of CN105357190A publication Critical patent/CN105357190A/en
Application granted granted Critical
Publication of CN105357190B publication Critical patent/CN105357190B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Abstract

The invention discloses a method and system for performing authentication on an access request. The method comprises the following steps: receiving an access request of an access terminal by a CDN (Content Distribution Network) server, wherein the access request at least comprises a first identification used for identifying the access request; if the first identification is inquired in a local cache of the CDN server, then performing authentication on the access request locally by the CDN server, wherein authentication is used for determining the legality of the access request; and if the first identification is not inquired in the local cache of the CDN server, then transmitting the access request to an authentication server to perform authentication by the CDN server. The method and system for performing authentication on the access request provided by the invention solve the technical problem that an anti-stealing link method of the existing back to the source authentication only depends on the authentication server to recognize a hotlinking request in any case, so that the load of the authentication server is excessive.

Description

The method and system of access request authentication
Technical field
The present invention relates to computer realm, in particular to a kind of method and system of access request authentication.
Background technology
Along with the development of stream media technology, robber's chain behavior of Streaming Media is also becoming increasingly rampant, and means are day by day brilliant.Steal chain person by placing the video resource of other Streaming Media manufacturers in oneself website, usurp the video copy of regular manufacturer, this behavior not only can bring infringement of copyright, bandwidth resources also can be brought exhausted simultaneously, the problems such as server collapse, Video service business often takes back source authentication, embeds the modes such as processing module to identify and steal chain request in player, then carries out denied access to the request of robber's chain.
It should be noted that, often there are the following problems for the scheme of above-mentioned existing door chain:
(1) anti-stealing link method returning source authentication under any circumstance all only relies on authentication server to identify the request of robber's chain, causes authentication server load excessive.
(2) utilize and in player, embed processing module need again to develop player to the scheme that video is encrypted, consumes resources, and along with the complexity of algorithm, also larger to the degree of dependence of hardware.
(3) scheme of above-mentioned door chain is all directly refuse the request of robber's chain recognizing the request of robber's chain, and such consequence steals chain person to know that his robber's chain behavior is irrational very soon, then will make very soon and again steal chain strategy.
(4) the scheme accuracy rate of existing access request authentication is low, easily causes Lawful access request to be mistaken for unauthorized access request.
Anti-stealing link method for above-mentioned existing time source authentication under any circumstance all only relies on authentication server to identify the request of robber's chain, causes the technical problem that authentication server load is excessive, not yet proposes effective solution at present.
Summary of the invention
Embodiments provide a kind of method and system of access request authentication, under any circumstance all only rely on authentication server to identify the request of robber's chain with the anti-stealing link method at least solving existing time source authentication, cause the technical problem that authentication server load is excessive.
According to an aspect of the embodiment of the present invention, provide a kind of method of access request authentication, the method comprises: CDN server receives the access request of access terminal, and wherein, access request at least comprises the first mark for identification access request; If inquire the first mark in the local cache of CDN server, CDN server carries out authentication in this locality to access request, and wherein, authentication is for determining the legitimacy of access request; If do not inquire the first mark in the local cache of CDN server, access request is sent to authentication server and carries out authentication by CDN server.
According to the another aspect of the embodiment of the present invention, additionally provide a kind of system of access request authentication, this system comprises: client, and for sending the access request of access terminal, wherein, access request is at least for the first mark of identification access request; CDN server, for receiving access request, if inquire the first mark in the local cache of CDN server, CDN server carries out authentication in this locality to access request, if do not inquire the first mark in the local cache of CDN server, access request forwards by CDN server, and wherein, authentication is for determining the legitimacy of access request; Authentication server, sets up correspondence with CDN server, carries out authentication to the access request that CDN server forwards.
In embodiments of the present invention, adopt CDN server to receive the access request of access terminal, wherein, access request at least comprises the first mark for identification access request; If inquire the first mark in the local cache of CDN server, CDN server carries out authentication in this locality to access request, and wherein, authentication is for determining the legitimacy of access request; If do not inquire the first mark in the local cache of CDN server, access request is sent to authentication server and carries out authentication by CDN server.The anti-stealing link method solving existing time source authentication under any circumstance all only relies on authentication server to identify the request of robber's chain, causes the technical problem that authentication server load is excessive.
Accompanying drawing explanation
Accompanying drawing described herein is used to provide a further understanding of the present invention, and form a application's part, schematic description and description of the present invention, for explaining the present invention, does not form inappropriate limitation of the present invention.In the accompanying drawings:
Fig. 1 is the flow chart of the method for access request authentication according to the embodiment of the present invention one;
Fig. 2 is the flow chart of the method for the authentication of access request alternatively according to the embodiment of the present invention one;
Fig. 3 is the flow chart of the method for the authentication of access request alternatively according to the embodiment of the present invention one; And
Fig. 4 is the schematic diagram of the access request right discriminating system according to the embodiment of the present invention two.
Embodiment
The present invention program is understood better in order to make those skilled in the art person, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the embodiment of a part of the present invention, instead of whole embodiments.Based on the embodiment in the present invention, those of ordinary skill in the art, not making the every other embodiment obtained under creative work prerequisite, should belong to the scope of protection of the invention.
It should be noted that, term " first ", " second " etc. in specification of the present invention and claims and above-mentioned accompanying drawing are for distinguishing similar object, and need not be used for describing specific order or precedence.Should be appreciated that the data used like this can be exchanged in the appropriate case, so as embodiments of the invention described herein can with except here diagram or describe those except order implement.In addition, term " comprises " and " having " and their any distortion, intention is to cover not exclusive comprising, such as, contain those steps or unit that the process of series of steps or unit, method, system, product or equipment is not necessarily limited to clearly list, but can comprise clearly do not list or for intrinsic other step of these processes, method, product or equipment or unit.
Embodiment one
According to the embodiment of the present invention, provide a kind of embodiment of method of access request authentication, it should be noted that, can perform in the computer system of such as one group of computer executable instructions in the step shown in the flow chart of accompanying drawing, and, although show logical order in flow charts, in some cases, can be different from the step shown or described by order execution herein.
Fig. 1 is the flow chart of the method for a kind of access request authentication according to the embodiment of the present invention, and as shown in Figure 1, the method comprises the steps:
Step S12, CDN server receives the access request of access terminal, and wherein, access request at least comprises the first mark for identification access request.
Particularly, in this programme, above-mentioned access request can be URL request, above-mentioned first mark can for being included in an ID in URL request, this ID is used for each access request of identifying user, this ID can by following schemes generation: user is when by client-access CDN server, above-mentioned client can by the URI of user access request, timestamp, random string and KEY use irreversible encryption algorithm for encryption, generate the ID for identifying above-mentioned URL request, then by above-mentioned ID, timestamp expressly and random number are inserted in after URL domain name, generate the resource request URL that has uniqueness, then the resource request URL of the above-mentioned ID contained is sent to CDN server by client, it should be noted that, CDN server in the application can be CDN node server, also can be CDN Edge Server.
It should be noted that, the generation method of the ID of URL request is not limited to aforesaid way, as long as the generation scheme of ID can reach the uniqueness of ID.
Such as, user A accesses CDN server by client (legitimate client or illegitimate client), in the URL of the access request of the user A received in CDN server, contains the ID of identification access request, timestamp, random string.Can the access request URL of user A be following example: http://wstest.com.cn/a.flv? k=68b329da9893e34099c7d8ad5cb9c940 & t=554afcb4 & UID=11111111; K is unique ID, and wherein t is timestamp, and UID is random train).Here it should be noted that, if when user A accesses CDN server by a legal client (such as portal website), to be above-mentioned legal client generate for the access request of user URL request received by CDN server, if when user A accesses CDN server by an illegal client (third party steals chain website), the URL request received by CDN server is that above-mentioned illegal client is stolen or forged.
It should be noted that, the scheme of the application, only need exploitation system client being carried out to lightweight, to the code structure in CDN source server and service logic without the need to making any change, player end in client can initiate the request using md5sum (timestamp+random string+KEY) as random catalogue, therefore in this programme, player end only need do light methods, saves the resource of developer.
Step S14, if inquire the first mark in the local cache of CDN server, CDN server carries out authentication in this locality to access request, and wherein, authentication is for determining the legitimacy of access request.
Particularly, in this programme, above-mentioned CDN server can first be inquired about from local cache, inquire under comprising above-mentioned ID situation in local cache, then carry out authentication by above-mentioned CDN server according to authentication policy this access request to user preset, namely determine that the access request of above-mentioned user is the access request that chain is still stolen in Lawful access request.
It should be noted that, if have accessed CDN server by normal client (such as portal website) before user arbitrarily, so in CDN server, then can the IP address of access terminal corresponding to the ID of the ID of the access request of validated user and the access request of validated user by buffer memory, so in above-mentioned steps S14, if preserve the ID of the access request of validated user in the local cache of CDN server, so CDN server may be used for the legitimacy identifying this access request.
Step S16, if do not inquire the first mark in the local cache of CDN server, access request is sent to authentication server and carries out authentication by CDN server.
Particularly, in this programme, if do not have the first mark in the local cache of CDN server, CDN server will initiate authentication request to authentication server, carry out authentication by authentication server to above-mentioned access request.
First the present embodiment receives the access request of access terminal by CDN server, wherein, access request at least comprises the first mark for identification access request; If inquire the first mark in the local cache of CDN server, CDN server carries out authentication in this locality to access request, and wherein, authentication is for determining the legitimacy of access request; If do not inquire the first mark in the local cache of CDN server, access request is sent to authentication server and carries out authentication by CDN server, the anti-stealing link method solving existing time source authentication under any circumstance all only relies on authentication server to identify the request of robber's chain, causes the problem that authentication server load is excessive.
It should be noted that the pattern that this programme adopts local CDN node server judgement+authentication server to judge effectively can reduce the pressure of authentication server.
Alternatively, can also comprise the IP address of access terminal, step S14 in above-mentioned access request, if inquire the first mark in the local cache of CDN server, CDN server can comprise the step that access request carries out authentication in this locality:
Step S141, CDN server judges whether at least one IP address of local cache comprises the IP address of access terminal, and wherein, at least one IP address and first identifies has corresponding relation.
Step S142, when comprising, CDN server determination access request is legitimate request.
Step S143, in situation not to be covered, CDN server determination access request is for stealing chain request.
Particularly, in this programme, at least one IP address in above-mentioned steps S141 be before validated user sent after resource request to CDN server by legal client, multiple IP addresses of institute's buffer memory in CDN server, it should be noted that, in CDN server, at least one IP address and above-mentioned first of buffer memory identifies (ID) and has corresponding relation.In the buffer memory of CDN server, multiple IP address corresponding with multiple IP address first to identify (ID) be all legal, therefore, after CDN server receives this access request of active user, first judge that whether the ID of the access request of user is identical with the ID of buffer memory in CDN server, under identical circumstances, CDN server then can judge that whether the IP address of this access request of active user is identical with the IP address of buffer memory, under identical circumstances, then authentication is by illustrating that this current access request is legitimate request, if IP address is different, then illustrate that this current access request is illegal robber's chain request, authentication is not passed through, it should be noted that, in the buffer memory of CDN server, legal ID can corresponding multiple IP address, as long as the IP address of this access request of user is included in above-mentioned multiple IP address, then illustrate that this access request of user is legal request, can avoid because multiple exit IP causes the erroneous judgement of access request.
Here it should be noted that, when being cached with the ID of current access request in CDN server, this current access request one that might not illustrate is decided to be legal access request, because ID is likely the client forgery of current calling party or steals, in CDN server, the ID of institute's buffer memory is legal access request with corresponding multiple IP addresses, therefore, CDN server can judge whether the IP address of the reality of current access request belongs to above-mentioned multiple IP address further.
Alternatively, step S16, if do not inquire the first mark in the local cache of CDN server, access request is sent to the step that authentication server carries out authentication and can comprises by CDN server:
Step S161, if do not inquire the first mark in the local cache of authentication server, authentication server determination access request is legitimate request, and buffer memory first identifies the corresponding relation between the IP address of access terminal.
Particularly, in this programme, current access request (this access request) can be sent to authentication server by CDN server, by authentication server, authentication is carried out to this current access request, if do not inquire the ID of current access request in the local cache of authentication server, then illustrate, this current access request is for access first, access request can not for stealing chain request first, therefore, authentication server then determines that this accesses non-legally request first, and the corresponding relation between the IP address of this ID accessed first of buffer memory and access terminal.
Step S162, if inquire in the local cache of authentication server and comprise the first mark, authentication server judges whether at least one IP address of local cache comprises the IP address of access terminal, and wherein, at least one IP address and first identifies has corresponding relation; When comprising, authentication server determination access request is legitimate request; In situation not to be covered, authentication server determination access request is for stealing chain request.
Particularly, in this programme, at least one IP address in above-mentioned steps S162 can be sent after resource request by other the CDN server of legal client to CDN distributed network for validated user, the legitimate ip address of institute's buffer memory in other CDN server, then at least one corresponding for ID and ID of Lawful access request IP address is sent in the buffer memory of authentication server by other CDN server, it should be noted that, in authentication server the ID of buffer memory and at least one there is corresponding relation.In the buffer memory of authentication server, ID is legal with at least one corresponding IP address, therefore, after authentication server receives the current access request of current C DN server forwarding, first judge that whether the ID of the current access request of user is identical with the ID of buffer memory in authentication server, under identical circumstances, authentication server then can judge that whether the IP address of the access request of active user is identical with the IP address of buffer memory, under identical circumstances, then authentication is passed through, illustrate that this current access request is legitimate request, if IP address is different, then illustrate that this current access request is illegal robber's chain request, authentication is not passed through.It should be noted that, in the buffer memory of authentication server, legal ID can corresponding multiple IP address, as long as the IP address of this access request of user is included in above-mentioned multiple IP address, then illustrates that this access request of user is legal request.
Alternatively, step S16, if do not inquire the first mark in the local cache of CDN server, access request is sent to after authentication server carries out authentication by CDN server, and the method that the present embodiment provides can also comprise:
Step S17, authenticating result is sent to CDN server by authentication server, and wherein, authenticating result at least comprises: steal the IP address of access terminal of chain request and the IP address of the access terminal of legitimate request.
Particularly, in this programme, if when authentication server does not pass through current access request authentication, then the IP address of the access terminal stealing chain request is sent to CDN server, if when authentication server passes through current access request authentication, the IP address of the access terminal of legitimate request is also sent to CDN server by authentication server, is processed current access request by CDN server.
Alternatively, in step S17, after authenticating result is sent to CDN server by authentication server, the method that the present embodiment provides can also comprise:
Step S18, speed limit or denied access are carried out in the IP address of CDN server to the access terminal stealing chain request.
Particularly, in this programme, CDN server can to the IP address normal feedback resource of legitimate request, to illegal robber's chain request with refusal.
In a kind of preferred embodiment, CDN server does not directly carry out denied access to the IP address of stealing chain request, but speed limit, the effect that chain person is stolen in fascination can be played like this, allow robber's chain person think and steal chain success, directly can hit the website user stealing chain person and experience.
The application's composition graphs 2 to Fig. 3 below, describes this programme under a kind of application scenarios of reality:
This programme can be applied to the system preventing from illegally stealing chain, prevents from illegally stealing in the system of chain can comprise client, CDN server, authentication server at this.Client sends access request to CDN node server, CDN server oneself can carry out authentication and customer in response end to access request, access request also can be forwarded to authentication server by client, authentication is carried out by authentication server, authentication server carries out authentication to this access request, and authenticating result is fed back to CDN server, CDN server is according to authenticating result customer in response end.
Particularly, client can initiate with unique ID (ID using URI+ timestamp+random string+KEY four uses irreversible encryption algorithm for encryption to generate), timestamp expressly and at random string as the URL request of catalogue.CDN server is on the basis of CDN distribution function, realizes Edge Server and judges URL in this locality and process, and initiates authentication and process authenticating result.The authentication server mainly authentication request be responsible for CDN Edge Server module is initiated judges, and issues judged result.
Composition graphs 2, the step that CDN server carries out authentication to access request is as follows:
Step S30, CDN server receives the access request of client.
Step S31, CDN server judges that whether the encryption format in access request in URL is correct, and whether timestamp is effective, when encryption is incorrect or timestamp is invalid, perform step S32, under, timestamp correct at encryption format is effectively asked, perform step S33.
Particularly, above-mentioned steps S31 carries out time wrong door chain verification to the URL of access request, mainly comprises unique ID and encrypts string correctness and the whether expired verification of timestamp.
Step S32, the access of refusal client, it should be noted that, if the encryption format of the URL of access request or the incorrect words of timestamp, then illustrate that the robber's chain mode stealing chain person is not brilliant, CDN server then directly refuses the access request of client.
Step S33, CDN server judges the corresponding relation of local cache whether buffer memory ID and IP address, in a case of yes, performs step S34, in a case of no, performs step S35.
It should be noted that, the ID of above-mentioned ID entrained by the access request URL of user.
Step S34, CDN server judges that whether ID and the IP address of local cache is identical with ID and the IP address that the URL of access request carries, and under identical circumstances, performs step S341, when not identical, performs step S342.
Step S341, authentication is passed through, normal response client.
Step S342, authentication is not passed through, and carries out speed limit to client
Step S35, access request is sent to authentication server by CDN server, carries out authentication by authentication server to this access request.
Particularly, if the corresponding relation between ID and IP that the URL of this access request carries is not at CDN server local cache, then CDN server then initiates authentication request to authentication server, and does local cache process to the corresponding relation of ID and IP that URL carries at CDN fringe node.
Step S36, CDN server receives the authenticating result of authentication server feedback, according to authenticating result customer in response end.
Particularly, if the authenticating result of authentication server response is that authentication is not passed through, then CDN fringe node does speed limit process to response to the content of client.Particularly, if the authenticating result of authentication server response is that authentication is passed through, then CDN server normal response content is to client.
As shown in Figure 3, the step that authentication server carries out authentication to access request can be as follows:
Step S40, authentication server receives the authentication request that CDN server sends.
Step S41, authentication server judges the corresponding relation of ID and the IP of local whether cache access request, in a case of yes, performs step S42, in a case of no, execution step S43.
It should be noted that, the ID of above-mentioned ID entrained by the access request URL of user.
Step S42, ID and the IP address of buffer memory is identical with ID and the IP address that the URL of access request carries in authentication server, performs step S421, in different situations, performs step S422.
Step S421, authentication is passed through, and authenticating result is sent to CDN server by authentication server.
Step S422, authentication is not passed through, and authenticating result is sent to CDN server by authentication server.
Step S43, authentication is passed through, and the corresponding relation between ID and the IP address that the URL of access request carries by authentication server carries out buffer memory.
Step S44, authenticating result is sent to CDN server by authentication server.
Embodiment two
The embodiment of the present invention additionally provides a kind of system of access request authentication, and this system may be used for the method performing above-described embodiment one, and as shown in Figure 4, this system can comprise: client 20, CDN server 22 and authentication server 24.
Client 20, for sending the access request of access terminal, wherein, access request is at least for the first mark of identification access request.
CDN server 22, for receiving access request, if inquire the first mark in the local cache of CDN server, CDN server carries out authentication in this locality to access request, if do not inquire the first mark in the local cache of CDN server, access request forwards by CDN server, and wherein, authentication is for determining the legitimacy of access request.
Particularly, in this programme, above-mentioned access request can be URL request, above-mentioned first mark can for being included in an ID in URL request, this ID is used for each access request of identifying user, this ID can by following schemes generation: user is when by client-access CDN server, above-mentioned client can by the URI of user access request, timestamp, random string and KEY use irreversible encryption algorithm for encryption, generate the ID for identifying above-mentioned URL request, then by above-mentioned ID, timestamp expressly and random number are inserted in after URL domain name, generate the resource request URL that has uniqueness, then the resource request URL of the above-mentioned ID contained is sent to CDN server by client, it should be noted that, CDN server in the application can be CDN node server, also can be CDN Edge Server.
It should be noted that, the generation method of the ID of URL request is not limited to aforesaid way, as long as the generation scheme of ID can reach the uniqueness of ID.
Such as, user A accesses CDN server by client (legitimate client or illegitimate client), in the URL of the access request of the user A received in CDN server, contains the ID of identification access request, timestamp, random string.Can the access request URL of user A be following example: http://wstest.com.cn/a.flv? k=68b329da9893e34099c7d8ad5cb9c940 & t=554afcb4 & UID=11111111; K is unique ID, and wherein t is timestamp, and UID is random train).Here it should be noted that, if when user A accesses CDN server by a legal client (such as portal website), to be above-mentioned legal client generate for the access request of user URL request received by CDN server, if when user A accesses CDN server by an illegal client (third party steals chain website), the URL request received by CDN server is that above-mentioned illegal client is stolen or forged.
It should be noted that, the scheme of the application, only need exploitation system client being carried out to lightweight, to the code structure in CDN source server and service logic without the need to making any change, player end in client can initiate the request using md5sum (timestamp+random string+KEY) as random catalogue, therefore in this programme, player end only need do light methods, saves the resource of developer.
Optionally, in this programme, above-mentioned CDN server can first be inquired about from local cache, inquire under comprising above-mentioned ID situation in local cache, then carry out authentication by above-mentioned CDN server according to authentication policy this access request to user preset, namely determine that the access request of above-mentioned user is the access request that chain is still stolen in Lawful access request.
It should be noted that, if have accessed CDN server by normal client (such as portal website) before user arbitrarily, so in CDN server, then can the IP address of access terminal corresponding to the ID of the ID of the access request of validated user and the access request of validated user by buffer memory, so in above-mentioned steps S14, if preserve the ID of the access request of validated user in the local cache of CDN server, so CDN server may be used for the legitimacy identifying this access request, if preserve the ID of the access request of validated user in the local cache of CDN server, access request forwards by CDN server.
Authentication server 24, sets up correspondence with CDN server, carries out authentication to the access request that CDN server forwards.
Particularly, in this programme, if do not have the first mark in the local cache of CDN server, CDN server will initiate authentication request to authentication server, carry out authentication by authentication server to above-mentioned access request.
First the present embodiment receives the access request of access terminal by CDN server, wherein, access request at least comprises the first mark for identification access request; If inquire the first mark in the local cache of CDN server, CDN server carries out authentication in this locality to access request, and wherein, authentication is for determining the legitimacy of access request; If do not inquire the first mark in the local cache of CDN server, access request is sent to authentication server and carries out authentication by CDN server, the anti-stealing link method solving existing time source authentication under any circumstance all only relies on authentication server to identify the request of robber's chain, causes the problem that authentication server load is excessive.
Alternatively, access request also comprises the IP address of access terminal, wherein, above-mentioned CDN server 22 can comprise: first processor, for judging whether at least one IP address of local cache comprises the IP address of access terminal, wherein, at least one IP address and first identifies has corresponding relation; When comprising, CDN server determination access request is legitimate request; In situation not to be covered, CDN server determination access request is for stealing chain request.
Alternatively, above-mentioned authentication server can also comprise: the second processor, if do not inquire the first mark in the local cache of authentication server, authentication server determination access request is legitimate request, and buffer memory first identifies the corresponding relation between the IP address of access terminal; If inquire in the local cache of authentication server and comprise the first mark, authentication server judges whether at least one IP address of local cache comprises the IP address of access terminal, and wherein, at least one IP address and first identifies has corresponding relation; When comprising, authentication server determination access request is legitimate request; In situation not to be covered, authentication server determination access request is for stealing chain request.
Alternatively, above-mentioned authentication server can also comprise: communicator, and for authenticating result is sent to CDN server, wherein, authenticating result at least comprises: steal the IP address of access terminal of chain request and the IP address of the access terminal of legitimate request.
Alternatively, above-mentioned first processor can also be used for carrying out speed limit or denied access to the IP address of the access terminal stealing chain request.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
In the above embodiment of the present invention, the description of each embodiment is all emphasized particularly on different fields, in certain embodiment, there is no the part described in detail, can see the associated description of other embodiments.
In several embodiments that the application provides, should be understood that, disclosed technology contents, the mode by other realizes.Wherein, device embodiment described above is only schematic, the such as division of described unit, can be that a kind of logic function divides, actual can have other dividing mode when realizing, such as multiple unit or assembly can in conjunction with or another system can be integrated into, or some features can be ignored, or do not perform.Another point, shown or discussed coupling each other or direct-coupling or communication connection can be by some interfaces, and the indirect coupling of unit or module or communication connection can be electrical or other form.
The described unit illustrated as separating component or can may not be and physically separates, and the parts as unit display can be or may not be physical location, namely can be positioned at a place, or also can be distributed on multiple unit.Some or all of unit wherein can be selected according to the actual needs to realize the object of the present embodiment scheme.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, also can be that the independent physics of unit exists, also can two or more unit in a unit integrated.Above-mentioned integrated unit both can adopt the form of hardware to realize, and the form of SFU software functional unit also can be adopted to realize.
If described integrated unit using the form of SFU software functional unit realize and as independently production marketing or use time, can be stored in a computer read/write memory medium.Based on such understanding, the part that technical scheme of the present invention contributes to prior art in essence in other words or all or part of of this technical scheme can embody with the form of software product, this computer software product is stored in a storage medium, comprises all or part of step of some instructions in order to make a computer equipment (can be personal computer, server or the network equipment etc.) perform method described in each embodiment of the present invention.And aforesaid storage medium comprises: USB flash disk, read-only memory (ROM, Read-OnlyMemory), random access memory (RAM, RandomAccessMemory), portable hard drive, magnetic disc or CD etc. various can be program code stored medium.
The above is only the preferred embodiment of the present invention; it should be pointed out that for those skilled in the art, under the premise without departing from the principles of the invention; can also make some improvements and modifications, these improvements and modifications also should be considered as protection scope of the present invention.

Claims (10)

1. a method for access request authentication, is characterized in that, comprising:
CDN server receives the access request of access terminal, and wherein, described access request at least comprises the first mark for identifying described access request;
If inquire described first mark in the local cache of described CDN server, described CDN server carries out authentication in this locality to described access request, and wherein, described authentication is for determining the legitimacy of described access request;
If do not inquire described first mark in the local cache of described CDN server, described access request is sent to authentication server and carries out authentication by described CDN server.
2. method according to claim 1, it is characterized in that, described access request also comprises the IP address of described access terminal, wherein, if inquire described first mark in the local cache of described CDN server, described CDN server is carried out authentication in this locality to described access request and is comprised:
Described CDN server judges whether at least one IP address of local cache comprises the IP address of described access terminal, and wherein, at least one IP address described and described first identifies has corresponding relation;
When comprising, described CDN server determines that described access request is legitimate request;
In situation not to be covered, described CDN server determines that described access request is for stealing chain request.
3. method according to claim 1, is characterized in that, described access request is sent to authentication server and carries out authentication and comprise by described CDN server:
If do not inquire described first mark in the local cache of described authentication server, described authentication server determines that described access request is legitimate request, and the corresponding relation described in buffer memory between the first mark and the IP address of described access terminal;
Described first mark is comprised if inquired in the local cache of described authentication server, described authentication server judges whether at least one IP address of local cache comprises the IP address of described access terminal, wherein, at least one IP address described and described first identifies and has corresponding relation;
When comprising, described authentication server determines that described access request is legitimate request;
In situation not to be covered, described authentication server determines that described access request is for stealing chain request.
4. method according to claim 3, is characterized in that, described access request to be sent to after authentication server carries out authentication in described CDN server, described method also comprises:
Authenticating result is sent to described CDN server by described authentication server, and wherein, described authenticating result at least comprises: the IP address of the IP address of the access terminal of described robber's chain request and the access terminal of described legitimate request.
5. method according to claim 4, is characterized in that, after authenticating result is sent to described CDN server by described authentication server, described method also comprises:
Speed limit or denied access are carried out in the IP address of described CDN server to the access terminal of described robber's chain request.
6. a system for access request authentication, is characterized in that, described system comprises:
Client, for sending the access request of access terminal, wherein, described access request is at least for identifying the first mark of described access request;
CDN server, for receiving described access request, if inquire described first mark in the local cache of described CDN server, described CDN server carries out authentication in this locality to described access request, if do not inquire described first mark in the local cache of described CDN server, described access request forwards by described CDN server, and wherein, described authentication is for determining the legitimacy of described access request;
Authentication server, sets up correspondence with described CDN server, carries out authentication to the described access request that described CDN server forwards.
7. system according to claim 6, is characterized in that, described access request also comprises the IP address of described access terminal, and wherein, described CDN server comprises:
First processor, for judging whether at least one IP address of local cache comprises the IP address of described access terminal, wherein, at least one IP address described and described first identifies has corresponding relation;
When comprising, described CDN server determines that described access request is legitimate request;
In situation not to be covered, described CDN server determines that described access request is for stealing chain request.
8. system according to claim 7, is characterized in that, described authentication server comprises:
Second processor, if do not inquire described first mark in the local cache of described authentication server, described authentication server determines that described access request is legitimate request, and the corresponding relation described in buffer memory between the first mark and the IP address of described access terminal;
Described first mark is comprised if inquired in the local cache of described authentication server, described authentication server judges whether at least one IP address of local cache comprises the IP address of described access terminal, wherein, at least one IP address described and described first identifies and has corresponding relation;
When comprising, described authentication server determines that described access request is legitimate request;
In situation not to be covered, described authentication server determines that described access request is for stealing chain request.
9. system according to claim 8, is characterized in that, described authentication server also comprises:
Communicator, for authenticating result is sent to described CDN server, wherein, described authenticating result at least comprises: the IP address of the IP address of the access terminal of described robber's chain request and the access terminal of described legitimate request.
10. system according to claim 9, is characterized in that, described first processor also carries out speed limit or denied access for the IP address of the access terminal to the request of described robber's chain.
CN201510703837.7A 2015-10-26 2015-10-26 The method and system of access request authentication Active CN105357190B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510703837.7A CN105357190B (en) 2015-10-26 2015-10-26 The method and system of access request authentication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510703837.7A CN105357190B (en) 2015-10-26 2015-10-26 The method and system of access request authentication

Publications (2)

Publication Number Publication Date
CN105357190A true CN105357190A (en) 2016-02-24
CN105357190B CN105357190B (en) 2018-12-07

Family

ID=55333054

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510703837.7A Active CN105357190B (en) 2015-10-26 2015-10-26 The method and system of access request authentication

Country Status (1)

Country Link
CN (1) CN105357190B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844121A (en) * 2016-03-31 2016-08-10 乐视控股(北京)有限公司 Method and system for applying digital watermark to content delivery network (CDN)
CN105871888A (en) * 2016-05-16 2016-08-17 乐视控股(北京)有限公司 Identity authentication method, device and system
CN106357613A (en) * 2016-08-25 2017-01-25 乐视控股(北京)有限公司 Validation method of mobile terminal and validation system thereof
CN106790262A (en) * 2017-02-07 2017-05-31 腾讯科技(深圳)有限公司 A kind of method for authenticating and device
CN107517194A (en) * 2016-06-17 2017-12-26 阿里巴巴集团控股有限公司 A kind of content distributing network returns source authentication method and device
CN109379344A (en) * 2018-09-27 2019-02-22 网宿科技股份有限公司 The method for authenticating and authentication server of access request
CN109982277A (en) * 2017-12-28 2019-07-05 中国移动通信集团北京有限公司 A kind of business authorization method and device
CN110062006A (en) * 2019-05-08 2019-07-26 福州福昕网络技术有限责任公司 A kind of client high concurrent method for authenticating and system
CN110392016A (en) * 2018-04-18 2019-10-29 阿里巴巴集团控股有限公司 Prevent the methods, devices and systems that flow is held as a hostage
CN110740353A (en) * 2018-07-20 2020-01-31 北京优酷科技有限公司 Request identification method and device
WO2020098773A1 (en) * 2018-11-15 2020-05-22 北京金山云网络技术有限公司 Request response method and device, edge node and authentication system
CN111277592A (en) * 2018-06-27 2020-06-12 贵州白山云科技股份有限公司 Authentication method, authentication device, storage medium and computer equipment
CN111314365A (en) * 2020-02-25 2020-06-19 卓望数码技术(深圳)有限公司 Application downloading method, application link generating method, device and medium
CN112565305A (en) * 2021-02-19 2021-03-26 北京翼辉信息技术有限公司 Method, system and storage medium for accessing local area network equipment by using domain name
CN112866221A (en) * 2021-01-11 2021-05-28 中国邮政储蓄银行股份有限公司 Authentication method, authentication system, computer-readable storage medium, and processor
CN114500067A (en) * 2022-02-09 2022-05-13 厦门元屿安科技有限公司 Asynchronous attack anti-theft chain method and system based on CDN edge computing network
WO2023231848A1 (en) * 2022-05-31 2023-12-07 华为技术有限公司 Cross-domain access method and content delivery network edge server

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102468961A (en) * 2010-11-18 2012-05-23 卓望数码技术(深圳)有限公司 Distributive enterprise identification authentication method, system and embedded terminal
CN103888409A (en) * 2012-12-19 2014-06-25 中国电信股份有限公司 Distributed unified authentication method and system
CN103986735A (en) * 2014-06-05 2014-08-13 北京赛维安讯科技发展有限公司 CDN (content distribution network) antitheft system and antitheft method
US20140258713A1 (en) * 2010-03-22 2014-09-11 Echostar Technologies L.L.C. Systems and methods for securely streaming media content
US20150201033A1 (en) * 2014-01-10 2015-07-16 Facebook. Inc. Content specific router caching
CN104811438A (en) * 2015-03-26 2015-07-29 网宿科技股份有限公司 Asynchronous hotlink protection method and system based on scheduling system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140258713A1 (en) * 2010-03-22 2014-09-11 Echostar Technologies L.L.C. Systems and methods for securely streaming media content
CN102468961A (en) * 2010-11-18 2012-05-23 卓望数码技术(深圳)有限公司 Distributive enterprise identification authentication method, system and embedded terminal
CN103888409A (en) * 2012-12-19 2014-06-25 中国电信股份有限公司 Distributed unified authentication method and system
US20150201033A1 (en) * 2014-01-10 2015-07-16 Facebook. Inc. Content specific router caching
CN103986735A (en) * 2014-06-05 2014-08-13 北京赛维安讯科技发展有限公司 CDN (content distribution network) antitheft system and antitheft method
CN104811438A (en) * 2015-03-26 2015-07-29 网宿科技股份有限公司 Asynchronous hotlink protection method and system based on scheduling system

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844121A (en) * 2016-03-31 2016-08-10 乐视控股(北京)有限公司 Method and system for applying digital watermark to content delivery network (CDN)
CN105871888A (en) * 2016-05-16 2016-08-17 乐视控股(北京)有限公司 Identity authentication method, device and system
CN107517194B (en) * 2016-06-17 2020-09-01 阿里巴巴集团控股有限公司 Return source authentication method and device of content distribution network
CN107517194A (en) * 2016-06-17 2017-12-26 阿里巴巴集团控股有限公司 A kind of content distributing network returns source authentication method and device
CN106357613A (en) * 2016-08-25 2017-01-25 乐视控股(北京)有限公司 Validation method of mobile terminal and validation system thereof
CN106790262A (en) * 2017-02-07 2017-05-31 腾讯科技(深圳)有限公司 A kind of method for authenticating and device
WO2018145546A1 (en) * 2017-02-07 2018-08-16 腾讯科技(深圳)有限公司 Authentication method, device and storage medium
CN109982277B (en) * 2017-12-28 2021-04-13 中国移动通信集团北京有限公司 Service authorization method, device and readable medium
CN109982277A (en) * 2017-12-28 2019-07-05 中国移动通信集团北京有限公司 A kind of business authorization method and device
CN110392016A (en) * 2018-04-18 2019-10-29 阿里巴巴集团控股有限公司 Prevent the methods, devices and systems that flow is held as a hostage
CN110392016B (en) * 2018-04-18 2022-05-31 阿里巴巴集团控股有限公司 Method, device and system for preventing traffic from being hijacked
CN111277592A (en) * 2018-06-27 2020-06-12 贵州白山云科技股份有限公司 Authentication method, authentication device, storage medium and computer equipment
CN110740353A (en) * 2018-07-20 2020-01-31 北京优酷科技有限公司 Request identification method and device
CN109379344B (en) * 2018-09-27 2022-05-10 网宿科技股份有限公司 Authentication method and authentication server for access request
CN109379344A (en) * 2018-09-27 2019-02-22 网宿科技股份有限公司 The method for authenticating and authentication server of access request
CN111193692A (en) * 2018-11-15 2020-05-22 北京金山云网络技术有限公司 Request response method, device, edge node and authentication system
WO2020098773A1 (en) * 2018-11-15 2020-05-22 北京金山云网络技术有限公司 Request response method and device, edge node and authentication system
CN110062006A (en) * 2019-05-08 2019-07-26 福州福昕网络技术有限责任公司 A kind of client high concurrent method for authenticating and system
CN111314365A (en) * 2020-02-25 2020-06-19 卓望数码技术(深圳)有限公司 Application downloading method, application link generating method, device and medium
CN111314365B (en) * 2020-02-25 2022-08-16 卓望数码技术(深圳)有限公司 Application downloading method, application link generating method, device and medium
CN112866221A (en) * 2021-01-11 2021-05-28 中国邮政储蓄银行股份有限公司 Authentication method, authentication system, computer-readable storage medium, and processor
CN112565305A (en) * 2021-02-19 2021-03-26 北京翼辉信息技术有限公司 Method, system and storage medium for accessing local area network equipment by using domain name
CN112565305B (en) * 2021-02-19 2022-03-08 北京翼辉信息技术有限公司 Method, system and storage medium for accessing local area network equipment by using domain name
CN114500067A (en) * 2022-02-09 2022-05-13 厦门元屿安科技有限公司 Asynchronous attack anti-theft chain method and system based on CDN edge computing network
WO2023231848A1 (en) * 2022-05-31 2023-12-07 华为技术有限公司 Cross-domain access method and content delivery network edge server

Also Published As

Publication number Publication date
CN105357190B (en) 2018-12-07

Similar Documents

Publication Publication Date Title
CN105357190A (en) Method and system for performing authentication on access request
KR100568228B1 (en) Method for resisting program tampering using serial number and for upgrading obfuscated program, and apparatus for the same
KR101531450B1 (en) Improvements in watermark extraction efficiency
WO2016184216A1 (en) Link-stealing prevention method, link-stealing prevention server, and client side
US7426750B2 (en) Network-based content distribution system
US7653940B2 (en) Tracing and identifying piracy in wireless digital rights management system
CN101075866B (en) Method and system for loading message on Internet
CN104869102B (en) Authorization method, device and system based on xAuth agreement
JP2018501567A (en) Device verification method and equipment
CN107517179A (en) A kind of method for authenticating, device and system
WO2012117253A1 (en) An authentication system
GB2508965A (en) Copyright protection by comparing identifiers of first and second electronic content
US11503072B2 (en) Identifying, reporting and mitigating unauthorized use of web code
WO2001061913A2 (en) Network-based content distribution system
CN110690972A (en) Token authentication method and device, electronic equipment and storage medium
CN106330968B (en) Identity authentication method and device for access equipment
TWI422206B (en) Tolerant key verification method
CN110807210B (en) Information processing method, platform, system and computer storage medium
CN110955909B (en) Personal data protection method and block link point
US9294480B2 (en) Tracking and tracing information theft from information systems
CN111602380A (en) Method and system for identifying a user terminal for receiving streaming protected multimedia content
JP5161053B2 (en) User authentication method, user authentication system, service providing apparatus, and authentication control apparatus
CN110348177B (en) Copyright protection method and system for media file
CN114978552B (en) Security management method, device, equipment and medium for mailbox verification code
CN117579338A (en) Method for processing streaming media file and related equipment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant