CN105827673B - A kind of method, apparatus and network server of door chain - Google Patents
A kind of method, apparatus and network server of door chain Download PDFInfo
- Publication number
- CN105827673B CN105827673B CN201510004464.4A CN201510004464A CN105827673B CN 105827673 B CN105827673 B CN 105827673B CN 201510004464 A CN201510004464 A CN 201510004464A CN 105827673 B CN105827673 B CN 105827673B
- Authority
- CN
- China
- Prior art keywords
- terminal
- resource
- request
- user information
- key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
- Small-Scale Networks (AREA)
Abstract
The present invention provides a kind of method, apparatus of door chain and network servers, this method comprises: receiving the access request that terminal is sent;The user information of terminal and the actual address of requested resource are obtained according to access request, generate the identifier for identification access request, and saved;Special address is generated according to identifier, and is sent to terminal;Receive the resource request that terminal is sent according to special address;According to the user information and identifier of the terminal saved, whether the user information that verifying sends the terminal of resource request is consistent with the user information for the terminal for sending access request, if unanimously, carrying out resource request with the actual address of requested resource;After resource request success, the actual address of the identifier of preservation, the user information of terminal and requested resource is deleted.The solution of the present invention ensures browser of the resource request from same user and/or same user that user proposes, and the resource request proposed is disposably, to substantially increase and steal chain difficulty.
Description
Technical field
The present invention relates to field of network data transmission technology more particularly to the method, apparatus and network of a kind of door chain to take
Business device.
Background technique
With the swift and violent growth of Internet user, the money of itself is enriched in more and more websites by the way of stealing chain
Source.Therefore many content and service provider are enabled to feel more pressure, because it is surely oneself that the resource being placed on oneself server is different
It is used.Sometimes because steal chain caused by content server paralysis case it is also too numerous to enumerate.
As shown in Figure 1, the down sending content mechanism of generic web page picture normal in the industry or other content is that user asks at present
Picture is sought, corresponding caricature portal, i.e. web application server can issue corresponding content link (Uniform Resource
Locator, URL), user terminal goes to download relevant image content according to link zone content server.According to such mode, chain is stolen
The technical staff of the content, as long as obtaining URL by packet capturing, it can content " is taken into one's own possession ".
In addition, some website processing modes are to increase watermark to picture during picture is uploaded onto the server.Although one
Determine to protect picture copyright in degree, but on the one hand destroys the quality of picture itself, another aspect and not alleviated robber's chain sheet
Body bring influences.
After some website processing modes are request content server, in addition user agent (User Agent, UA) information.It is anti-
The mechanism of chain is stolen there is also loophole, the website for stealing chain need to only add a UA that can break through with mapping table is linked.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of method, apparatus of door chain and network server, Neng Goubao
Browser of the resource request from same user and/or same user that user proposes is demonstrate,proved, and the resource request proposed is one
Secondary property, the occurrence of stealing chain can be effectively prevent.
In order to solve the above-mentioned technical problem, the present invention adopts the following technical scheme:
According to one aspect of the present invention, a kind of method of door chain is provided, comprising:
The access request that terminal is sent is received, includes the use for the resource and terminal requested needed for terminal in the access request
Family information;
The user information of the terminal and the actual address of requested resource are obtained according to the access request, are generated and are used
In the identifier of the mark access request, and saved;
Special address is generated according to the identifier, and is sent to the terminal;
The resource request that terminal is sent according to the special address is received, includes sending resource request in the resource request
Terminal user information;
According to the user information and identifier of the terminal saved, verifying sends the user information and hair of the terminal of resource request
Send the user information of the terminal of access request whether consistent, if unanimously, carrying out resource with the actual address of requested resource and asking
It asks;
After resource request success, the identifier, the user information of terminal and the reality of requested resource of preservation are deleted
Border address.
Wherein, the user information of the terminal includes the media access control address (MAC) and/or the browser client of terminal
Act on behalf of UA information.
Wherein, the user information of the terminal and the actual address of requested resource are obtained according to the access request,
The identifier for identifying the access request is generated, and the step of being saved includes:
By the identifier of generation, the MAC Address and/or browser UA information and terminal request of the terminal of acquisition
The actual address of resource form key-value to key-value, and save in the caches, wherein key includes the mark
Symbol, value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
Wherein, special address is generated according to the identifier, and the step of being sent to the terminal includes:
The key of the key-value is extracted, and the key is subjected to encryption and forms special address, and is sent to the end
End.
Wherein, the user information and identifier according to the terminal saved, verifying send user's letter of the terminal of resource request
Whether breath is consistent with the user information for the terminal for sending access request, if unanimously, being carried out with the actual address of requested resource
The step of resource request includes:
The special address is decrypted, the key is extracted, and obtains the MAC Address of terminal for initiating resource request and/or clear
Look at device UA information;
Corresponding key-value is searched according to the key extracted;
When inquiring corresponding key-value, the MAC Address of the terminal of the transmission resource request obtained is judged
And/or whether the MAC Address and/or browser UA information of the terminal in browser UA information and the value including are consistent;
If judgement is consistent, resource request is carried out with the actual address of requested resource.
Wherein, after resource request goes out success, the identifier of preservation, the user information of terminal and requested money are deleted
The step of actual address in source includes:
After resource request success, the key-value saved in cache is deleted.
According to another aspect of the invention, a kind of device of door chain is additionally provided, comprising:
First receiving module includes asking needed for terminal in the access request for receiving the access request of terminal transmission
The user information of the resource and terminal asked;
Memory module, for obtaining the user information of the terminal and the reality of requested resource according to the access request
Border address generates the identifier for identifying the access request, and is saved;
Sending module for generating special address according to the identifier, and is sent to the terminal;
Second receiving module, the resource request sent for receiving terminal according to the special address, the resource request
In include send resource request terminal user information;
Authentication module, for the user information and identifier according to the terminal saved, verifying sends the terminal of resource request
User information with send access request terminal user information it is whether consistent, if unanimously, with the reality of requested resource
Address carries out resource request;
Removing module, after resource request success, for deleting the user information of the identifier saved, terminal and being asked
The actual address for the resource asked.
Wherein, the user information of the terminal includes MAC address and/or the browser client generation of terminal
Manage UA information.
Wherein, the memory module is further used for:
By the identifier of generation, the MAC Address and/or browser UA information and terminal request of the terminal of acquisition
The actual address of resource form key-value to key-value, and save in the caches, wherein key includes the mark
Symbol, value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
Wherein, the sending module is further used for: extracting the key of the key-value, and the key is added
It is close to form special address, and it is sent to the terminal.
Wherein, the authentication module includes:
Decryption unit extracts the key, and obtain the terminal for initiating resource request for decrypting the special address
MAC Address and/or browser UA information;
Searching unit, for searching corresponding key-value according to the key extracted;
Judging unit, the end of the transmission resource request for when inquiring corresponding key-value, judging to obtain
The MAC Address and/or browser UA information for the terminal for including in the MAC Address and/or browser UA information and the value at end
It is whether consistent;
Processing unit carries out resource request if consistent for judging with the actual address of requested resource.
Wherein, the removing module is further used for:
After resource request success, the key-value saved in cache is deleted.
According to another aspect of the invention, a kind of network server is additionally provided, including door chain described above
Device.
The beneficial effects of the present invention are:
The method of the door chain of the embodiment of the present invention obtains terminal by handling the access request that terminal is sent
The resource actual address in the server of user's request and the user information of terminal, and generating being capable of unique identification this access
The identifier of request.When terminal sends resource request to server with the special address that generates according to identifier, server with
The user information of the corresponding terminal of the access request that the identifier of storage is identified compares, and when comparing consistent, terminal just can be with
Actual address carries out resource request.
It, should even if stealing chain because in special address not including the actual address of requested resource in the server
The technical staff of content intercepts and captures the special address in intermediate link, still can not successfully obtain the specific interior of requested resource
Hold.
In addition, the method for door chain of the invention can be by identifier, the user information of terminal after resource request success
And the actual address of requested resource is deleted, so that the link is failed immediately after access content server is primary.
Detailed description of the invention
Fig. 1 shows the down sending content mechanism principle schematic diagrames of Web page picture in the prior art;
Fig. 2 indicates the method flow schematic diagram of the door chain of the embodiment of the present invention;
Fig. 3 indicates the apparatus structure block diagram of the door chain of the embodiment of the present invention;
The structural block diagram of Fig. 4 expression authentication module.
Specific embodiment
Exemplary embodiments of the present disclosure are described in more detail below with reference to accompanying drawings.Although showing the disclosure in attached drawing
Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here
It is limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure
It is fully disclosed to those skilled in the art.
Embodiment one
One aspect according to an embodiment of the present invention provides a kind of method of door chain, and this method is firstly, receive terminal
The access request of transmission;Then, the user information of the terminal and the reality of requested resource are obtained according to the access request
Border address generates the identifier for identifying the access request, and is saved;Again, it is generated according to the identifier
Special address, and it is sent to the terminal;Again, the resource request that terminal is sent according to the special address is received;Again, according to
According to the user information and identifier of the terminal of preservation, verifying sends the user information of the terminal of resource request and sends access request
Terminal user information it is whether consistent, if unanimously, carrying out resource request with the actual address of requested resource;Last resource
After requesting successfully, the identifier, the user information of terminal and the actual address of requested resource of preservation are deleted.
As shown in Fig. 2, this method comprises:
Step S201, the access request that terminal is sent is received.
Wherein, the user information of the resource and terminal requested needed for terminal is carried in access request.
Optionally, the user information of the terminal includes the MAC address and/or browser client of terminal
Act on behalf of UA information.
When terminal user is in request hypertext markup language (Hyper Text Markup language, HTML) page
When, such as when being related to picture content and needing to access content server, then server needs the access request according to terminal user
Obtain the MAC Address and/or browser UA information of terminal user.Wherein, browser UA information is used to the different clear of distinguishing terminal
Look at device, same terminal, which installs different browsers then, different UA values.
Step S203, the user information and requested resource for obtaining the terminal according to the access request are practically
Location generates the identifier for identifying the access request, and is saved.
Optionally, step S203 includes:
By the identifier of generation, the MAC Address and/or browser UA information and terminal request of the terminal of acquisition
The actual address of resource form key-value to key-value, and save in the caches, wherein key includes the mark
Symbol, value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
The method of the door chain of the embodiment of the present invention, it is corresponding with the access request each time of terminal user by generating
Key-value, and save in the caches, it is ensured that the access request each time of terminal user has unique key.Its
In, the key in key-value, the identifier including terminal user, for this access request of identity user.Wherein, it identifies
Mono- random number of Fu Kewei.
Step S205, special address is generated according to the identifier, and is sent to the terminal.
Optionally, step S205 includes:
The key of the key-value is extracted, and the key is subjected to encryption and forms special address, and is sent to the end
End.
In the method for the door chain of the embodiment of the present invention, the special address of generation is by key, i.e. identifier, by adding
It is formed after close processing, ciphering process therein further increases the difficulty for stealing chain, but the side of the door chain of the embodiment of the present invention
Method does not limit Encryption Algorithm therein specifically.
In addition, server will carry this access of unique identification after terminal user sends access request to server
The special address of the identifier of request is sent to terminal, due to not including requested resource in the special address in server
In actual address still can not be at so even if the technical staff for stealing the chain content intercepts and captures the special address in intermediate link
The particular content of function acquisition requested resource.
Step S207, the resource request that terminal is sent according to the special address is received.
It wherein, include the user information for sending the terminal of resource request in the resource request.
Step S209, the user information and identifier according to the terminal saved, verifying send the use of the terminal of resource request
Whether family information is consistent with the user information for the terminal for sending access request, if unanimously, with the actual address of requested resource
Carry out resource request.
Optionally, step S209 includes:
The special address is decrypted, the key is extracted, and obtains the MAC Address of terminal for initiating resource request and/or clear
Look at device UA information;
Corresponding key-value is searched according to the key extracted;
When inquiring corresponding key-value, the MAC Address of the terminal of the transmission resource request obtained is judged
And/or whether the MAC Address and/or browser UA information of the terminal in browser UA information and the value including are consistent;
If judgement is consistent, resource request is carried out with the actual address of requested resource.
The method of the door chain of the embodiment of the present invention initiates resource request to server with special address in terminal user
When, server obtains the MAC Address for proposing the user of resource request and/or clear by decrypting and extract the key in special address
It lookes at device UA information, looks for whether that there are corresponding key-value in the caches according to key information, if it does not exist then resource
Failure is obtained, when there are corresponding key-value, the MAC Address and/or browsing of the user in comparison caching in value value
Whether device UA information is identical as the MAC Address and/or browser UA information of the terminal user of the initiation resource request got, if
It is identical that resource is then requested to server with the request address of actual address replacement user.
Step S211, after resource request success, the identifier of preservation, the user information of terminal and requested are deleted
The actual address of resource.
Optionally, when by the actual address of the user information of identifier, terminal and requested resource with key-value shape
When formula is saved in the caches, after resource request success, the key-value saved in cache can be deleted, so that access
After content server is primary, link is failed immediately, effectively prevents the occurrence of stealing chain.
Embodiment two
Other side according to an embodiment of the present invention additionally provides a kind of device of door chain, as shown in figure 3, the dress
Setting 300 includes:
First receiving module 301 includes needed for terminal in the access request for receiving the access request of terminal transmission
The resource of request and the user information of terminal;
Memory module 303 includes request needed for terminal in the access request for receiving the access request of terminal transmission
Resource and terminal user information;
Sending module 305 for generating special address according to the identifier, and is sent to the terminal;
Second receiving module 307, the resource request sent for receiving terminal according to the special address, the resource are asked
It include the user information for sending the terminal of resource request in asking;
Authentication module 309, for the user information and identifier according to the terminal saved, verifying sends the end of resource request
Whether the user information at end is consistent with the user information for the terminal for sending access request, if unanimously, with the reality of requested resource
Border address carries out resource request;
Removing module 311, for resource request success after, delete the identifier of preservation, the user information of terminal and
The actual address of requested resource.
Optionally, the user information of the terminal includes the MAC address and/or browser client of terminal
Act on behalf of UA information.
Optionally, the memory module 303 is further used for:
By the identifier of generation, the MAC Address and/or browser UA information and terminal request of the terminal of acquisition
The actual address of resource form key-value to key-value, and save in the caches, wherein key includes the mark
Symbol, value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
Optionally, the sending module 305 is further used for:
The key of the key-value is extracted, and the key is subjected to encryption and forms special address, and is sent to the end
End.
Optionally, as shown in figure 4, the authentication module 309 includes:
Decryption unit 3091 extracts the key, and obtain the end for initiating resource request for decrypting the special address
The MAC Address and/or browser UA information at end;
Searching unit 3092, for searching corresponding key-value according to the key extracted;
Judging unit 3093, the transmission resource request for when inquiring corresponding key-value, judging to obtain
Terminal MAC Address and/or browser UA information and the value in include terminal MAC Address and/or browser UA
Whether information is consistent;
Processing unit 3094 carries out resource request if consistent for judging with the actual address of requested resource.
Optionally, the removing module 311 is further used for:
After resource request success, the key-value saved in cache is deleted.
Embodiment three
Other side according to an embodiment of the present invention additionally provides a kind of network server, prevents including described above
Steal the device of chain.
Above-described is the preferred embodiment of the present invention, it should be pointed out that the ordinary person of the art is come
It says, can also make several improvements and retouch under the premise of not departing from principle of the present invention, these improvements and modifications also exist
In protection scope of the present invention.
Claims (13)
1. a kind of method of door chain characterized by comprising
The access request that terminal is sent is received, includes the user's letter for the resource and terminal requested needed for terminal in the access request
Breath;
The user information of the terminal and the actual address of requested resource are obtained according to the access request, random generate is used
In the identifier of the mark access request, and saved;
The identifier is encrypted, special address is generated, and is sent to the terminal;
The resource request that terminal is sent according to the special address is received, includes the end for sending resource request in the resource request
The user information at end;
According to the user information and identifier of the terminal saved, verifying sends the user information of the terminal of resource request and sends and visits
Ask whether the user information of the terminal of request is consistent, if sending the user information of the terminal of resource request and the mark of preservation
The user information for according with the identified corresponding terminal of access request is consistent, carries out resource with the actual address of requested resource and asks
It asks;
After resource request success, the identifier of preservation, the user information of terminal and requested resource are deleted practically
Location.
2. the method as described in claim 1, which is characterized in that the user information of the terminal includes the media access control of terminal
MAC Address and/or browser client processed act on behalf of UA information.
3. method according to claim 2, which is characterized in that obtain the user information of the terminal according to the access request
And the actual address of requested resource, it is random to generate for identifying the identifier of the access request, and saved
Step includes:
The identifier that will be generated at random, the MAC Address and/or browser UA information and terminal request of the terminal of acquisition
The actual address of resource form key-value to key-value, and save in the caches, wherein key includes the mark
Symbol, value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
4. method as claimed in claim 3, which is characterized in that the identifier is encrypted, special address is generated,
And the step of being sent to the terminal, includes:
The key of the key-value is extracted, and the key is subjected to encryption and forms special address, and is sent to the terminal.
5. method as claimed in claim 4, which is characterized in that according to the user information and identifier of the terminal saved, verifying
Whether the user information for sending the terminal of resource request is consistent with the user information for the terminal for sending access request, if sending resource
The user information one of the user information of the terminal of request terminal corresponding with the access request that the identifier of preservation is identified
The step of causing, carrying out resource request with the actual address of requested resource include:
The special address is decrypted, the key is extracted, and obtains the MAC Address and/or browser for initiating the terminal of resource request
UA information;
Corresponding key-value is searched according to the key extracted;
When inquiring corresponding key-value, judge obtain the transmission resource request terminal MAC Address and/or
Whether the MAC Address and/or browser UA information for the terminal for including in browser UA information and the value are consistent;
If judgement is consistent, resource request is carried out with the actual address of requested resource.
6. method as claimed in claim 3, which is characterized in that after resource request success, delete the identifier, the end of preservation
The step of actual address of the user information at end and requested resource includes:
After resource request success, the key-value saved in cache is deleted.
7. a kind of device of door chain characterized by comprising
First receiving module includes requesting in the access request needed for terminal for receiving the access request of terminal transmission
The user information of resource and terminal;
Memory module, user information and requested resource for obtaining the terminal according to the access request are practically
Location generates the identifier for identifying the access request at random, and is saved;
Sending module generates special address, and be sent to the terminal for the identifier to be encrypted;
Second receiving module wraps in the resource request for receiving resource request of the terminal according to the special address transmission
Include the user information for sending the terminal of resource request;
Authentication module, for the user information and identifier according to the terminal saved, verifying sends the use of the terminal of resource request
Family information with send access request terminal user information it is whether consistent, if send resource request terminal user information with
The user information for the corresponding terminal of access request that the identifier saved is identified is consistent, with the reality of requested resource
Address carries out resource request;
Removing module deletes the identifier of preservation, the user information of terminal and requested after resource request success
The actual address of resource.
8. device as claimed in claim 7, which is characterized in that the user information of the terminal includes the media access control of terminal
MAC Address and/or browser client processed act on behalf of UA information.
9. device as claimed in claim 8, which is characterized in that the memory module is further used for:
The identifier that will be generated at random, the MAC Address and/or browser UA information and terminal request of the terminal of acquisition
The actual address of resource form key-value to key-value, and save in the caches, wherein key includes the mark
Symbol, value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
10. device as claimed in claim 9, which is characterized in that the sending module is further used for: extracting the key-
The key of value, and the key is subjected to encryption and forms special address, and is sent to the terminal.
11. device as claimed in claim 10, which is characterized in that the authentication module includes:
Decryption unit extracts the key, and with obtaining the MAC for the terminal for initiating resource request for decrypting the special address
Location and/or browser UA information;
Searching unit, for searching corresponding key-value according to the key extracted;
Judging unit, the terminal of the transmission resource request for when inquiring corresponding key-value, judging to obtain
Whether the MAC Address and/or browser UA information for the terminal for including in MAC Address and/or browser UA information and the value
Unanimously;
Processing unit carries out resource request if consistent for judging with the actual address of requested resource.
12. device as claimed in claim 9, which is characterized in that the removing module is further used for:
After resource request success, the key-value saved in cache is deleted.
13. a kind of network server, which is characterized in that the dress including the door chain as described in claim 7~12 any one
It sets.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510004464.4A CN105827673B (en) | 2015-01-05 | 2015-01-05 | A kind of method, apparatus and network server of door chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510004464.4A CN105827673B (en) | 2015-01-05 | 2015-01-05 | A kind of method, apparatus and network server of door chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN105827673A CN105827673A (en) | 2016-08-03 |
CN105827673B true CN105827673B (en) | 2019-03-12 |
Family
ID=56513695
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510004464.4A Active CN105827673B (en) | 2015-01-05 | 2015-01-05 | A kind of method, apparatus and network server of door chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105827673B (en) |
Families Citing this family (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107026828B (en) * | 2016-02-02 | 2020-02-21 | 中国移动通信集团辽宁有限公司 | Anti-stealing-link method based on Internet cache and Internet cache |
CN108574686B (en) * | 2017-05-17 | 2021-08-06 | 北京金山云网络技术有限公司 | Method and device for previewing file online |
CN110365688B (en) * | 2019-07-19 | 2022-06-07 | 湖南快乐阳光互动娱乐传媒有限公司 | Anti-stealing-link method and device |
CN116170164A (en) * | 2021-11-24 | 2023-05-26 | 贵州白山云科技股份有限公司 | Method, device, electronic equipment and storage medium for requesting scheduling |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102025749A (en) * | 2011-01-18 | 2011-04-20 | 中国联合网络通信集团有限公司 | Anti-theft method of mobile streaming media service |
CN102055752A (en) * | 2009-10-29 | 2011-05-11 | 腾讯科技(深圳)有限公司 | Anti-leech method and terminal |
CN103701796A (en) * | 2013-12-23 | 2014-04-02 | 山东中创软件商用中间件股份有限公司 | Hotlink protection system and method on basis of HASH technology |
CN104009989A (en) * | 2014-05-22 | 2014-08-27 | Tcl集团股份有限公司 | Link-stealing-prevention method and system for media files and server |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9519403B2 (en) * | 2013-05-21 | 2016-12-13 | Samsung Electronics Co., Ltd. | Method and apparatus for performing URL linkage function using the keypad |
-
2015
- 2015-01-05 CN CN201510004464.4A patent/CN105827673B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102055752A (en) * | 2009-10-29 | 2011-05-11 | 腾讯科技(深圳)有限公司 | Anti-leech method and terminal |
CN102025749A (en) * | 2011-01-18 | 2011-04-20 | 中国联合网络通信集团有限公司 | Anti-theft method of mobile streaming media service |
CN103701796A (en) * | 2013-12-23 | 2014-04-02 | 山东中创软件商用中间件股份有限公司 | Hotlink protection system and method on basis of HASH technology |
CN104009989A (en) * | 2014-05-22 | 2014-08-27 | Tcl集团股份有限公司 | Link-stealing-prevention method and system for media files and server |
Also Published As
Publication number | Publication date |
---|---|
CN105827673A (en) | 2016-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3219068B1 (en) | Method of identifying and counteracting internet attacks | |
US8302169B1 (en) | Privacy enhancements for server-side cookies | |
CN105187389B (en) | A kind of Web access method and system for obscuring encryption based on number | |
CN105827673B (en) | A kind of method, apparatus and network server of door chain | |
CN104283903B (en) | The method for down loading and device of file | |
JP4256361B2 (en) | Authentication management method and system | |
CN107016074B (en) | Webpage loading method and device | |
CN112699350B (en) | Login verification method and device | |
US9015817B2 (en) | Resilient and restorable dynamic device identification | |
CN105635064B (en) | CSRF attack detection method and device | |
CN112261012A (en) | Browser, server and webpage access method | |
CN107209831A (en) | System and method for recognizing network attack | |
CN102055752A (en) | Anti-leech method and terminal | |
US20180302437A1 (en) | Methods of identifying and counteracting internet attacks | |
CN109818906B (en) | Equipment fingerprint information processing method and device and server | |
CN106101155B (en) | Method and device for protecting website | |
CN113904810B (en) | Privacy protection safety browsing method | |
CN105071922A (en) | Method of using cryptographic equipment by JAVASCRIPT | |
US10079856B2 (en) | Rotation of web site content to prevent e-mail spam/phishing attacks | |
CN111245774B (en) | Resource request processing method, device and system | |
JP2010257289A (en) | Communication apparatus, method for controlling communication apparatus, and program | |
CN104506518A (en) | Identity authentication method for access control of MIPS (Million Instructions Per Second) platform network system | |
CN109246062A (en) | A kind of authentication method and system based on browser plug-in | |
CN113609425A (en) | Webpage data processing method and system | |
CN105227519B (en) | It is a kind of to have secure access to the method for webpage, client and server |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |