CN105827673B - A kind of method, apparatus and network server of door chain - Google Patents

A kind of method, apparatus and network server of door chain Download PDF

Info

Publication number
CN105827673B
CN105827673B CN201510004464.4A CN201510004464A CN105827673B CN 105827673 B CN105827673 B CN 105827673B CN 201510004464 A CN201510004464 A CN 201510004464A CN 105827673 B CN105827673 B CN 105827673B
Authority
CN
China
Prior art keywords
terminal
resource
request
user information
key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510004464.4A
Other languages
Chinese (zh)
Other versions
CN105827673A (en
Inventor
蒋海滨
郑文彬
戴和忠
陈学
胡凌鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Zhejiang Co Ltd
Original Assignee
China Mobile Group Zhejiang Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Zhejiang Co Ltd filed Critical China Mobile Group Zhejiang Co Ltd
Priority to CN201510004464.4A priority Critical patent/CN105827673B/en
Publication of CN105827673A publication Critical patent/CN105827673A/en
Application granted granted Critical
Publication of CN105827673B publication Critical patent/CN105827673B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Small-Scale Networks (AREA)

Abstract

The present invention provides a kind of method, apparatus of door chain and network servers, this method comprises: receiving the access request that terminal is sent;The user information of terminal and the actual address of requested resource are obtained according to access request, generate the identifier for identification access request, and saved;Special address is generated according to identifier, and is sent to terminal;Receive the resource request that terminal is sent according to special address;According to the user information and identifier of the terminal saved, whether the user information that verifying sends the terminal of resource request is consistent with the user information for the terminal for sending access request, if unanimously, carrying out resource request with the actual address of requested resource;After resource request success, the actual address of the identifier of preservation, the user information of terminal and requested resource is deleted.The solution of the present invention ensures browser of the resource request from same user and/or same user that user proposes, and the resource request proposed is disposably, to substantially increase and steal chain difficulty.

Description

A kind of method, apparatus and network server of door chain
Technical field
The present invention relates to field of network data transmission technology more particularly to the method, apparatus and network of a kind of door chain to take Business device.
Background technique
With the swift and violent growth of Internet user, the money of itself is enriched in more and more websites by the way of stealing chain Source.Therefore many content and service provider are enabled to feel more pressure, because it is surely oneself that the resource being placed on oneself server is different It is used.Sometimes because steal chain caused by content server paralysis case it is also too numerous to enumerate.
As shown in Figure 1, the down sending content mechanism of generic web page picture normal in the industry or other content is that user asks at present Picture is sought, corresponding caricature portal, i.e. web application server can issue corresponding content link (Uniform Resource Locator, URL), user terminal goes to download relevant image content according to link zone content server.According to such mode, chain is stolen The technical staff of the content, as long as obtaining URL by packet capturing, it can content " is taken into one's own possession ".
In addition, some website processing modes are to increase watermark to picture during picture is uploaded onto the server.Although one Determine to protect picture copyright in degree, but on the one hand destroys the quality of picture itself, another aspect and not alleviated robber's chain sheet Body bring influences.
After some website processing modes are request content server, in addition user agent (User Agent, UA) information.It is anti- The mechanism of chain is stolen there is also loophole, the website for stealing chain need to only add a UA that can break through with mapping table is linked.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of method, apparatus of door chain and network server, Neng Goubao Browser of the resource request from same user and/or same user that user proposes is demonstrate,proved, and the resource request proposed is one Secondary property, the occurrence of stealing chain can be effectively prevent.
In order to solve the above-mentioned technical problem, the present invention adopts the following technical scheme:
According to one aspect of the present invention, a kind of method of door chain is provided, comprising:
The access request that terminal is sent is received, includes the use for the resource and terminal requested needed for terminal in the access request Family information;
The user information of the terminal and the actual address of requested resource are obtained according to the access request, are generated and are used In the identifier of the mark access request, and saved;
Special address is generated according to the identifier, and is sent to the terminal;
The resource request that terminal is sent according to the special address is received, includes sending resource request in the resource request Terminal user information;
According to the user information and identifier of the terminal saved, verifying sends the user information and hair of the terminal of resource request Send the user information of the terminal of access request whether consistent, if unanimously, carrying out resource with the actual address of requested resource and asking It asks;
After resource request success, the identifier, the user information of terminal and the reality of requested resource of preservation are deleted Border address.
Wherein, the user information of the terminal includes the media access control address (MAC) and/or the browser client of terminal Act on behalf of UA information.
Wherein, the user information of the terminal and the actual address of requested resource are obtained according to the access request, The identifier for identifying the access request is generated, and the step of being saved includes:
By the identifier of generation, the MAC Address and/or browser UA information and terminal request of the terminal of acquisition The actual address of resource form key-value to key-value, and save in the caches, wherein key includes the mark Symbol, value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
Wherein, special address is generated according to the identifier, and the step of being sent to the terminal includes:
The key of the key-value is extracted, and the key is subjected to encryption and forms special address, and is sent to the end End.
Wherein, the user information and identifier according to the terminal saved, verifying send user's letter of the terminal of resource request Whether breath is consistent with the user information for the terminal for sending access request, if unanimously, being carried out with the actual address of requested resource The step of resource request includes:
The special address is decrypted, the key is extracted, and obtains the MAC Address of terminal for initiating resource request and/or clear Look at device UA information;
Corresponding key-value is searched according to the key extracted;
When inquiring corresponding key-value, the MAC Address of the terminal of the transmission resource request obtained is judged And/or whether the MAC Address and/or browser UA information of the terminal in browser UA information and the value including are consistent;
If judgement is consistent, resource request is carried out with the actual address of requested resource.
Wherein, after resource request goes out success, the identifier of preservation, the user information of terminal and requested money are deleted The step of actual address in source includes:
After resource request success, the key-value saved in cache is deleted.
According to another aspect of the invention, a kind of device of door chain is additionally provided, comprising:
First receiving module includes asking needed for terminal in the access request for receiving the access request of terminal transmission The user information of the resource and terminal asked;
Memory module, for obtaining the user information of the terminal and the reality of requested resource according to the access request Border address generates the identifier for identifying the access request, and is saved;
Sending module for generating special address according to the identifier, and is sent to the terminal;
Second receiving module, the resource request sent for receiving terminal according to the special address, the resource request In include send resource request terminal user information;
Authentication module, for the user information and identifier according to the terminal saved, verifying sends the terminal of resource request User information with send access request terminal user information it is whether consistent, if unanimously, with the reality of requested resource Address carries out resource request;
Removing module, after resource request success, for deleting the user information of the identifier saved, terminal and being asked The actual address for the resource asked.
Wherein, the user information of the terminal includes MAC address and/or the browser client generation of terminal Manage UA information.
Wherein, the memory module is further used for:
By the identifier of generation, the MAC Address and/or browser UA information and terminal request of the terminal of acquisition The actual address of resource form key-value to key-value, and save in the caches, wherein key includes the mark Symbol, value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
Wherein, the sending module is further used for: extracting the key of the key-value, and the key is added It is close to form special address, and it is sent to the terminal.
Wherein, the authentication module includes:
Decryption unit extracts the key, and obtain the terminal for initiating resource request for decrypting the special address MAC Address and/or browser UA information;
Searching unit, for searching corresponding key-value according to the key extracted;
Judging unit, the end of the transmission resource request for when inquiring corresponding key-value, judging to obtain The MAC Address and/or browser UA information for the terminal for including in the MAC Address and/or browser UA information and the value at end It is whether consistent;
Processing unit carries out resource request if consistent for judging with the actual address of requested resource.
Wherein, the removing module is further used for:
After resource request success, the key-value saved in cache is deleted.
According to another aspect of the invention, a kind of network server is additionally provided, including door chain described above Device.
The beneficial effects of the present invention are:
The method of the door chain of the embodiment of the present invention obtains terminal by handling the access request that terminal is sent The resource actual address in the server of user's request and the user information of terminal, and generating being capable of unique identification this access The identifier of request.When terminal sends resource request to server with the special address that generates according to identifier, server with The user information of the corresponding terminal of the access request that the identifier of storage is identified compares, and when comparing consistent, terminal just can be with Actual address carries out resource request.
It, should even if stealing chain because in special address not including the actual address of requested resource in the server The technical staff of content intercepts and captures the special address in intermediate link, still can not successfully obtain the specific interior of requested resource Hold.
In addition, the method for door chain of the invention can be by identifier, the user information of terminal after resource request success And the actual address of requested resource is deleted, so that the link is failed immediately after access content server is primary.
Detailed description of the invention
Fig. 1 shows the down sending content mechanism principle schematic diagrames of Web page picture in the prior art;
Fig. 2 indicates the method flow schematic diagram of the door chain of the embodiment of the present invention;
Fig. 3 indicates the apparatus structure block diagram of the door chain of the embodiment of the present invention;
The structural block diagram of Fig. 4 expression authentication module.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure It is fully disclosed to those skilled in the art.
Embodiment one
One aspect according to an embodiment of the present invention provides a kind of method of door chain, and this method is firstly, receive terminal The access request of transmission;Then, the user information of the terminal and the reality of requested resource are obtained according to the access request Border address generates the identifier for identifying the access request, and is saved;Again, it is generated according to the identifier Special address, and it is sent to the terminal;Again, the resource request that terminal is sent according to the special address is received;Again, according to According to the user information and identifier of the terminal of preservation, verifying sends the user information of the terminal of resource request and sends access request Terminal user information it is whether consistent, if unanimously, carrying out resource request with the actual address of requested resource;Last resource After requesting successfully, the identifier, the user information of terminal and the actual address of requested resource of preservation are deleted.
As shown in Fig. 2, this method comprises:
Step S201, the access request that terminal is sent is received.
Wherein, the user information of the resource and terminal requested needed for terminal is carried in access request.
Optionally, the user information of the terminal includes the MAC address and/or browser client of terminal Act on behalf of UA information.
When terminal user is in request hypertext markup language (Hyper Text Markup language, HTML) page When, such as when being related to picture content and needing to access content server, then server needs the access request according to terminal user Obtain the MAC Address and/or browser UA information of terminal user.Wherein, browser UA information is used to the different clear of distinguishing terminal Look at device, same terminal, which installs different browsers then, different UA values.
Step S203, the user information and requested resource for obtaining the terminal according to the access request are practically Location generates the identifier for identifying the access request, and is saved.
Optionally, step S203 includes:
By the identifier of generation, the MAC Address and/or browser UA information and terminal request of the terminal of acquisition The actual address of resource form key-value to key-value, and save in the caches, wherein key includes the mark Symbol, value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
The method of the door chain of the embodiment of the present invention, it is corresponding with the access request each time of terminal user by generating Key-value, and save in the caches, it is ensured that the access request each time of terminal user has unique key.Its In, the key in key-value, the identifier including terminal user, for this access request of identity user.Wherein, it identifies Mono- random number of Fu Kewei.
Step S205, special address is generated according to the identifier, and is sent to the terminal.
Optionally, step S205 includes:
The key of the key-value is extracted, and the key is subjected to encryption and forms special address, and is sent to the end End.
In the method for the door chain of the embodiment of the present invention, the special address of generation is by key, i.e. identifier, by adding It is formed after close processing, ciphering process therein further increases the difficulty for stealing chain, but the side of the door chain of the embodiment of the present invention Method does not limit Encryption Algorithm therein specifically.
In addition, server will carry this access of unique identification after terminal user sends access request to server The special address of the identifier of request is sent to terminal, due to not including requested resource in the special address in server In actual address still can not be at so even if the technical staff for stealing the chain content intercepts and captures the special address in intermediate link The particular content of function acquisition requested resource.
Step S207, the resource request that terminal is sent according to the special address is received.
It wherein, include the user information for sending the terminal of resource request in the resource request.
Step S209, the user information and identifier according to the terminal saved, verifying send the use of the terminal of resource request Whether family information is consistent with the user information for the terminal for sending access request, if unanimously, with the actual address of requested resource Carry out resource request.
Optionally, step S209 includes:
The special address is decrypted, the key is extracted, and obtains the MAC Address of terminal for initiating resource request and/or clear Look at device UA information;
Corresponding key-value is searched according to the key extracted;
When inquiring corresponding key-value, the MAC Address of the terminal of the transmission resource request obtained is judged And/or whether the MAC Address and/or browser UA information of the terminal in browser UA information and the value including are consistent;
If judgement is consistent, resource request is carried out with the actual address of requested resource.
The method of the door chain of the embodiment of the present invention initiates resource request to server with special address in terminal user When, server obtains the MAC Address for proposing the user of resource request and/or clear by decrypting and extract the key in special address It lookes at device UA information, looks for whether that there are corresponding key-value in the caches according to key information, if it does not exist then resource Failure is obtained, when there are corresponding key-value, the MAC Address and/or browsing of the user in comparison caching in value value Whether device UA information is identical as the MAC Address and/or browser UA information of the terminal user of the initiation resource request got, if It is identical that resource is then requested to server with the request address of actual address replacement user.
Step S211, after resource request success, the identifier of preservation, the user information of terminal and requested are deleted The actual address of resource.
Optionally, when by the actual address of the user information of identifier, terminal and requested resource with key-value shape When formula is saved in the caches, after resource request success, the key-value saved in cache can be deleted, so that access After content server is primary, link is failed immediately, effectively prevents the occurrence of stealing chain.
Embodiment two
Other side according to an embodiment of the present invention additionally provides a kind of device of door chain, as shown in figure 3, the dress Setting 300 includes:
First receiving module 301 includes needed for terminal in the access request for receiving the access request of terminal transmission The resource of request and the user information of terminal;
Memory module 303 includes request needed for terminal in the access request for receiving the access request of terminal transmission Resource and terminal user information;
Sending module 305 for generating special address according to the identifier, and is sent to the terminal;
Second receiving module 307, the resource request sent for receiving terminal according to the special address, the resource are asked It include the user information for sending the terminal of resource request in asking;
Authentication module 309, for the user information and identifier according to the terminal saved, verifying sends the end of resource request Whether the user information at end is consistent with the user information for the terminal for sending access request, if unanimously, with the reality of requested resource Border address carries out resource request;
Removing module 311, for resource request success after, delete the identifier of preservation, the user information of terminal and The actual address of requested resource.
Optionally, the user information of the terminal includes the MAC address and/or browser client of terminal Act on behalf of UA information.
Optionally, the memory module 303 is further used for:
By the identifier of generation, the MAC Address and/or browser UA information and terminal request of the terminal of acquisition The actual address of resource form key-value to key-value, and save in the caches, wherein key includes the mark Symbol, value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
Optionally, the sending module 305 is further used for:
The key of the key-value is extracted, and the key is subjected to encryption and forms special address, and is sent to the end End.
Optionally, as shown in figure 4, the authentication module 309 includes:
Decryption unit 3091 extracts the key, and obtain the end for initiating resource request for decrypting the special address The MAC Address and/or browser UA information at end;
Searching unit 3092, for searching corresponding key-value according to the key extracted;
Judging unit 3093, the transmission resource request for when inquiring corresponding key-value, judging to obtain Terminal MAC Address and/or browser UA information and the value in include terminal MAC Address and/or browser UA Whether information is consistent;
Processing unit 3094 carries out resource request if consistent for judging with the actual address of requested resource.
Optionally, the removing module 311 is further used for:
After resource request success, the key-value saved in cache is deleted.
Embodiment three
Other side according to an embodiment of the present invention additionally provides a kind of network server, prevents including described above Steal the device of chain.
Above-described is the preferred embodiment of the present invention, it should be pointed out that the ordinary person of the art is come It says, can also make several improvements and retouch under the premise of not departing from principle of the present invention, these improvements and modifications also exist In protection scope of the present invention.

Claims (13)

1. a kind of method of door chain characterized by comprising
The access request that terminal is sent is received, includes the user's letter for the resource and terminal requested needed for terminal in the access request Breath;
The user information of the terminal and the actual address of requested resource are obtained according to the access request, random generate is used In the identifier of the mark access request, and saved;
The identifier is encrypted, special address is generated, and is sent to the terminal;
The resource request that terminal is sent according to the special address is received, includes the end for sending resource request in the resource request The user information at end;
According to the user information and identifier of the terminal saved, verifying sends the user information of the terminal of resource request and sends and visits Ask whether the user information of the terminal of request is consistent, if sending the user information of the terminal of resource request and the mark of preservation The user information for according with the identified corresponding terminal of access request is consistent, carries out resource with the actual address of requested resource and asks It asks;
After resource request success, the identifier of preservation, the user information of terminal and requested resource are deleted practically Location.
2. the method as described in claim 1, which is characterized in that the user information of the terminal includes the media access control of terminal MAC Address and/or browser client processed act on behalf of UA information.
3. method according to claim 2, which is characterized in that obtain the user information of the terminal according to the access request And the actual address of requested resource, it is random to generate for identifying the identifier of the access request, and saved Step includes:
The identifier that will be generated at random, the MAC Address and/or browser UA information and terminal request of the terminal of acquisition The actual address of resource form key-value to key-value, and save in the caches, wherein key includes the mark Symbol, value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
4. method as claimed in claim 3, which is characterized in that the identifier is encrypted, special address is generated, And the step of being sent to the terminal, includes:
The key of the key-value is extracted, and the key is subjected to encryption and forms special address, and is sent to the terminal.
5. method as claimed in claim 4, which is characterized in that according to the user information and identifier of the terminal saved, verifying Whether the user information for sending the terminal of resource request is consistent with the user information for the terminal for sending access request, if sending resource The user information one of the user information of the terminal of request terminal corresponding with the access request that the identifier of preservation is identified The step of causing, carrying out resource request with the actual address of requested resource include:
The special address is decrypted, the key is extracted, and obtains the MAC Address and/or browser for initiating the terminal of resource request UA information;
Corresponding key-value is searched according to the key extracted;
When inquiring corresponding key-value, judge obtain the transmission resource request terminal MAC Address and/or Whether the MAC Address and/or browser UA information for the terminal for including in browser UA information and the value are consistent;
If judgement is consistent, resource request is carried out with the actual address of requested resource.
6. method as claimed in claim 3, which is characterized in that after resource request success, delete the identifier, the end of preservation The step of actual address of the user information at end and requested resource includes:
After resource request success, the key-value saved in cache is deleted.
7. a kind of device of door chain characterized by comprising
First receiving module includes requesting in the access request needed for terminal for receiving the access request of terminal transmission The user information of resource and terminal;
Memory module, user information and requested resource for obtaining the terminal according to the access request are practically Location generates the identifier for identifying the access request at random, and is saved;
Sending module generates special address, and be sent to the terminal for the identifier to be encrypted;
Second receiving module wraps in the resource request for receiving resource request of the terminal according to the special address transmission Include the user information for sending the terminal of resource request;
Authentication module, for the user information and identifier according to the terminal saved, verifying sends the use of the terminal of resource request Family information with send access request terminal user information it is whether consistent, if send resource request terminal user information with The user information for the corresponding terminal of access request that the identifier saved is identified is consistent, with the reality of requested resource Address carries out resource request;
Removing module deletes the identifier of preservation, the user information of terminal and requested after resource request success The actual address of resource.
8. device as claimed in claim 7, which is characterized in that the user information of the terminal includes the media access control of terminal MAC Address and/or browser client processed act on behalf of UA information.
9. device as claimed in claim 8, which is characterized in that the memory module is further used for:
The identifier that will be generated at random, the MAC Address and/or browser UA information and terminal request of the terminal of acquisition The actual address of resource form key-value to key-value, and save in the caches, wherein key includes the mark Symbol, value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
10. device as claimed in claim 9, which is characterized in that the sending module is further used for: extracting the key- The key of value, and the key is subjected to encryption and forms special address, and is sent to the terminal.
11. device as claimed in claim 10, which is characterized in that the authentication module includes:
Decryption unit extracts the key, and with obtaining the MAC for the terminal for initiating resource request for decrypting the special address Location and/or browser UA information;
Searching unit, for searching corresponding key-value according to the key extracted;
Judging unit, the terminal of the transmission resource request for when inquiring corresponding key-value, judging to obtain Whether the MAC Address and/or browser UA information for the terminal for including in MAC Address and/or browser UA information and the value Unanimously;
Processing unit carries out resource request if consistent for judging with the actual address of requested resource.
12. device as claimed in claim 9, which is characterized in that the removing module is further used for:
After resource request success, the key-value saved in cache is deleted.
13. a kind of network server, which is characterized in that the dress including the door chain as described in claim 7~12 any one It sets.
CN201510004464.4A 2015-01-05 2015-01-05 A kind of method, apparatus and network server of door chain Active CN105827673B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510004464.4A CN105827673B (en) 2015-01-05 2015-01-05 A kind of method, apparatus and network server of door chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510004464.4A CN105827673B (en) 2015-01-05 2015-01-05 A kind of method, apparatus and network server of door chain

Publications (2)

Publication Number Publication Date
CN105827673A CN105827673A (en) 2016-08-03
CN105827673B true CN105827673B (en) 2019-03-12

Family

ID=56513695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510004464.4A Active CN105827673B (en) 2015-01-05 2015-01-05 A kind of method, apparatus and network server of door chain

Country Status (1)

Country Link
CN (1) CN105827673B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107026828B (en) * 2016-02-02 2020-02-21 中国移动通信集团辽宁有限公司 Anti-stealing-link method based on Internet cache and Internet cache
CN108574686B (en) * 2017-05-17 2021-08-06 北京金山云网络技术有限公司 Method and device for previewing file online
CN110365688B (en) * 2019-07-19 2022-06-07 湖南快乐阳光互动娱乐传媒有限公司 Anti-stealing-link method and device
CN116170164A (en) * 2021-11-24 2023-05-26 贵州白山云科技股份有限公司 Method, device, electronic equipment and storage medium for requesting scheduling

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025749A (en) * 2011-01-18 2011-04-20 中国联合网络通信集团有限公司 Anti-theft method of mobile streaming media service
CN102055752A (en) * 2009-10-29 2011-05-11 腾讯科技(深圳)有限公司 Anti-leech method and terminal
CN103701796A (en) * 2013-12-23 2014-04-02 山东中创软件商用中间件股份有限公司 Hotlink protection system and method on basis of HASH technology
CN104009989A (en) * 2014-05-22 2014-08-27 Tcl集团股份有限公司 Link-stealing-prevention method and system for media files and server

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9519403B2 (en) * 2013-05-21 2016-12-13 Samsung Electronics Co., Ltd. Method and apparatus for performing URL linkage function using the keypad

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102055752A (en) * 2009-10-29 2011-05-11 腾讯科技(深圳)有限公司 Anti-leech method and terminal
CN102025749A (en) * 2011-01-18 2011-04-20 中国联合网络通信集团有限公司 Anti-theft method of mobile streaming media service
CN103701796A (en) * 2013-12-23 2014-04-02 山东中创软件商用中间件股份有限公司 Hotlink protection system and method on basis of HASH technology
CN104009989A (en) * 2014-05-22 2014-08-27 Tcl集团股份有限公司 Link-stealing-prevention method and system for media files and server

Also Published As

Publication number Publication date
CN105827673A (en) 2016-08-03

Similar Documents

Publication Publication Date Title
EP3219068B1 (en) Method of identifying and counteracting internet attacks
US8302169B1 (en) Privacy enhancements for server-side cookies
CN105187389B (en) A kind of Web access method and system for obscuring encryption based on number
CN105827673B (en) A kind of method, apparatus and network server of door chain
CN104283903B (en) The method for down loading and device of file
JP4256361B2 (en) Authentication management method and system
CN107016074B (en) Webpage loading method and device
CN112699350B (en) Login verification method and device
US9015817B2 (en) Resilient and restorable dynamic device identification
CN105635064B (en) CSRF attack detection method and device
CN112261012A (en) Browser, server and webpage access method
CN107209831A (en) System and method for recognizing network attack
CN102055752A (en) Anti-leech method and terminal
US20180302437A1 (en) Methods of identifying and counteracting internet attacks
CN109818906B (en) Equipment fingerprint information processing method and device and server
CN106101155B (en) Method and device for protecting website
CN113904810B (en) Privacy protection safety browsing method
CN105071922A (en) Method of using cryptographic equipment by JAVASCRIPT
US10079856B2 (en) Rotation of web site content to prevent e-mail spam/phishing attacks
CN111245774B (en) Resource request processing method, device and system
JP2010257289A (en) Communication apparatus, method for controlling communication apparatus, and program
CN104506518A (en) Identity authentication method for access control of MIPS (Million Instructions Per Second) platform network system
CN109246062A (en) A kind of authentication method and system based on browser plug-in
CN113609425A (en) Webpage data processing method and system
CN105227519B (en) It is a kind of to have secure access to the method for webpage, client and server

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant