CN102055752A - Anti-leech method and terminal - Google Patents

Anti-leech method and terminal Download PDF

Info

Publication number
CN102055752A
CN102055752A CN2009102358994A CN200910235899A CN102055752A CN 102055752 A CN102055752 A CN 102055752A CN 2009102358994 A CN2009102358994 A CN 2009102358994A CN 200910235899 A CN200910235899 A CN 200910235899A CN 102055752 A CN102055752 A CN 102055752A
Authority
CN
China
Prior art keywords
download request
terminal use
download
request
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2009102358994A
Other languages
Chinese (zh)
Inventor
王志华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN2009102358994A priority Critical patent/CN102055752A/en
Publication of CN102055752A publication Critical patent/CN102055752A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention relates to an anti-leech method and terminal, belonging to the technical field of network data transmission, and solving the problems of poor anti-leech reliability and accuracy and easy cracking of anti-leech measures in the existing anti-leech technology. The method comprises the following steps: sending a downloader to a terminal user with a downloading request, wherein the downloader is used for sending data for authenticating whether the downloading is valid; sending the requested data to the terminal user with the downloading request; receiving the data for authenticating whether the downloading is valid sent by the terminal user with the downloading request; and according to the validity of the data for authenticating whether the downloading is valid, sending the requested data to the terminal user with the downloading request. In the invention, by authenticating the data for authenticating whether the downloading is valid sent by the downloader, the validity of the terminal user with the downloading request is determined, so that the invention has the characteristics of higher anti-leech reliability and accuracy and difficult cracking of the anti-leech measures.

Description

A kind of method of door chain and terminal
Technical field
The present invention relates to a kind of method and terminal of door chain, belong to field of network data transmission technology.
Background technology
Chain is stolen in the website can a large amount of bandwidth that consume stolen chain website, grievous injury the interests of stolen chain website.According to the difference of the form of stealing chain, can be divided into two classes stealing chain: conventional chain and the distributed robber's chain stolen.Conventional to steal chain more elementary, simultaneously also more common, has certain specific aim, only usurps the link of certain or some websites, and technology content is not high, realizes also fairly simplely, and the link that need embed others at the page of oneself gets final product.Distributed robber's chain is an a kind of new form of stealing chain, the system design complexity, this robber's chain is not generally at some websites, any machine all may become the object of stealing chain on the Internet, adopt the service provider of distributed robber's chain generally can special procedure be set and grasp useful link on the internet, store into then in the database of oneself on the backstage.And, all being translated into inquiry to the data with existing storehouse for each visit of end user, the URL that is queried to is exactly the object of stolen chain.Owing to the viewed device of the visit of file has been masked, so the imperceptible link of visiting of end user is the link that is stolen.
The method of traditional door chain mainly comprises to be judged the reference address method and uses living document name method.Judge that the reference address method is that the value of the Referer field of HTTP head when judging browse request determines whether to steal chain, but reference address is forged easily, door chain is not thorough.Using living document name method is when the user clicks a download link, calculate a Key at program end earlier, in database or Cache, write down this Key and its pairing resource ID or filename then, relief webpage is redirected a new URL address, needs to comprise this Key in this new URL address.When browser or download tool send download request, whether program detects this Key earlier and exists, if exist then return with corresponding resource data, but after any one user's download success, your resource will be listed in " resource short-list " by some download tools, when other people download same file in other places later on, still can not download as long as Key loses efficacy, robber's chain has also just continued.
Therefore, in the technology of existing door chain, have that the reliability of door chain and accuracy are relatively poor, the problem of door chain measure easy crack.
Summary of the invention
The present invention relates to a kind of method and terminal of door chain,, have that the reliability of door chain and accuracy are relatively poor, the problem of the measure easy crack of door chain to solve in the technology of existing door chain.
A kind of method of door chain comprises:
Send downloader to the terminal use that download request is arranged, described downloader is used for sending checking and whether downloads active data, and the data that send request to the described terminal use that download request arranged;
Receive checking that the described terminal use that download request arranged sends and whether download active data, and the validity of downloading active data whether according to described checking sends the data of request to the described terminal use that download request arranged.
A kind of terminal of door chain comprises:
The downloader transmitting element is used for sending downloader to the terminal use that download request is arranged, and described downloader is used for sending checking and whether downloads active data, and the data that send request to the described terminal use that download request arranged;
The download request authentication unit, be used to receive checking that the described terminal use that download request arranged sends and whether download active data, and the validity of downloading active data whether according to described checking sends the data of request to the described terminal use that download request arranged.
Whether the checking that the present invention is sent by downloader by checking downloads active data, and with the terminal use's that defines download request validity, reliability and accuracy with door chain are higher, the characteristics that the door chain measure is difficult for being cracked.
Description of drawings
Fig. 1 is the schematic flow sheet of the method for a kind of door chain of providing of the specific embodiment of the present invention;
Fig. 2 schematic flow sheet that to be downloading of providing of the specific embodiment of the present invention carry out from the process of server data download that data download is provided the terminal use that download request is arranged;
Fig. 3 is the server that data download is provided that the specific embodiment of the present invention provides provides a schematic flow sheet from download to the terminal use that download request is arranged;
Fig. 4 is the structural representation of the terminal of a kind of door chain of providing of the specific embodiment of the present invention.
Embodiment
The specific embodiment of the present invention provides a kind of method of door chain, at first sends downloader to the terminal use that download request is arranged, and downloader is used for sending checking and whether downloads active data and the data that send request to the terminal use that download request is arranged; Whether the checking that the terminal use that receiving then has download request sends downloads active data, and downloads the validity of active data whether sends data from request to the terminal use that download request is arranged according to checking.
Further, corresponding downloader comprise download, file URL and key; The URL of predefined parameter that comprised the increase that obtains by key and pre-defined algorithm by downloading of active data whether is downloaded in corresponding checking.
And the URL that obtains to have increased predefined parameter by key and pre-defined algorithm that downloads accordingly comprises:
Acquisition has the terminal use's of download request MAC Address and local zone time;
Add and close MAC Address of pre-defined algorithm and local zone time by key;
According to the terminal use's that download request is arranged MAC Address and local zone time, and MAC Address and the local zone time encrypted are increased in the parameter of file URL.
In addition, corresponding receive checking that terminal use that download request is arranged sends and whether download active data, and whether download the validity of active data according to checking and send requested packets to the terminal use that download request is arranged and draw together:
Whether the local zone time of judging the terminal use that download request is arranged surpasses predetermined scope, then returns failed download to the terminal use that download request is arranged if surpass predetermined scope;
Then judge the predefined parameter that obtains by the key that comprises in the downloader and pre-defined algorithm if surpass predetermined scope, predefined parameter among the URL that sends with the terminal use that download request is arranged compares, if inequalityly then return failed download to the terminal use that download request is arranged;
If the identical data that then send request to the terminal use that download request is arranged.
The method of a kind of door chain that provides for clearer explanation the specific embodiment of the present invention now is elaborated to this method in conjunction with Figure of description, as shown in Figure 1, specifically can comprise:
Step 11 sends downloader to the terminal use that download request is arranged, and downloader is used for sending checking and whether downloads active data and the data that send request to the terminal use that download request is arranged.
When the server that data download is provided proposes download request, have the terminal use of download request at first to download a downloader as the terminal use of download request from the server that data download is provided, this downloader comprise download, file URL and key.Downloading is used for sending checking and whether downloads active data, and the data of terminal use's request that download request is arranged that will send from the server that data download is provided; File URL has comprised some parameters of terminal use that download request is arranged, this machine MAC Address, local zone time of the terminal use of download request etc. are for example arranged, the parameter that file URL can also increase encrypt by downloading, and be used as the checking that sends to the server that data download is provided and whether download active data; Key is the password that only downloads and provide the server of data download to preserve, and when the file URL that has comprised encryption parameter sends to the server that data download is provided by the terminal use that download request is arranged, can verify by key.
Whether step 12, the checking that the terminal use that receiving has download request sends download active data, and download the validity of active data whether sends data from request to the terminal use that download request is arranged according to checking.
In the downloader download can be by increase that key and pre-defined algorithm are obtained the URL of predefined parameter whether download active data as checking, and send to the server that data download is provided.There is the terminal use of download request mainly to finish by downloading from the server data download that data download is provided, as shown in Figure 2, the flow process of carrying out from the process of server data download that data download is provided the terminal use that download request is arranged that downloads can may further comprise the steps:
Obtain this machine MAC Address of the terminal use of download request, be designated as MAC;
Obtain the terminal use's of download request local zone time, be designated as TIME;
By key and MD5 algorithm for encryption MAC and TIME, i.e. MD5 (MAC+TIME);
File URL is increased by 3 parameters, and parameter value is respectively MD5, plaintext M AC and plaintext TIME;
The file URL that use has increased by 3 parameters sends download request to the server that data download is provided;
If the result who provides the server of data download to return downloads effectively, then will there be the data of the terminal use request of download request to download to the terminal use of download request from the server that data download is provided, if the result who provides the server of data download to return is that download is invalid, then return failed download to the terminal use that download request is arranged.
After whether the checking that the terminal use that providing the server of data download to receive has download request sends downloads active data, judge at first whether the terminal use's that download request is arranged local zone time exceeds the scope of the server regulation that data download is provided, for example time range is 1 minute, the terminal use that download request then arranged from send download request to the time beginning to download can not be above 1 minute, if surpassing 1 minute then can not download, its purpose is as if stipulated time scope or time range are not too small, has obtained the stolen chain of download tool meeting of downloading permission; Then the judgement whether active data carries out validity is downloaded in checking, promptly provide the server of data download to judge the checking of terminal use's transmission that download request is arranged downloads whether whether whether active data identical with the data of this locality generation, if identical then the download effectively, if inequality then download invalid.As shown in Figure 3, provide the server of data download to provide process of downloading specifically can may further comprise the steps to the terminal use that download request is arranged:
Whether the checking that sends from the terminal use that download request is arranged who receives is downloaded and to be extracted MD5, plaintext M AC and TIME expressly the active data;
Whether the local zone time of judging the terminal use that download request is arranged surpasses predetermined scope, then returns failed download to the terminal use that download request is arranged if surpass predetermined scope;
Then judge the MD5 value that obtains by the key that comprises in the downloader and MD5 algorithm if surpass predetermined scope, MD5 value among the URL that sends with the terminal use that download request is arranged compares, and then returns failed download to the terminal use that download request is arranged as if inequality;
If the identical data that then send request to the terminal use that download request is arranged.
Whether the checking that the server authentication of the specific embodiment of the present invention by data download is provided sent by downloader downloads active data, validity with the terminal use that defines download request, can prevent existing various robber's chain mode, have the reliability and the higher characteristics of accuracy of door chain; In addition, the specific embodiment of the present invention downloads by the right checking of the operable key of the server that data download only is provided whether active data is verified, and the definite event horizon of effectively downloading of preset time scope, make the door chain measure more be difficult for being cracked.
The specific embodiment of the present invention also provides a kind of device of door chain, as shown in Figure 4, specifically can comprise:
Downloader transmitting element 41 is used for sending downloader to the terminal use that download request is arranged, and downloader is used for sending checking and whether downloads active data and the data that send request to the terminal use that download request is arranged;
Download request authentication unit 42 is used to receive checking that the terminal use of download request sends and whether downloads active data, and downloads the validity of active data whether sends data from request to the terminal use that download request is arranged according to checking.
Further, in the downloader transmitting element, downloader comprise download, file URL and key; In the download request authentication unit, the URL of predefined parameter that comprised the increase that obtains by key and pre-defined algorithm by downloading of active data whether is downloaded in checking.
And in the download request authentication unit, downloader can comprise:
MAC Address and time obtain the unit, are used to obtain the terminal use's of download request MAC Address and local zone time;
Ciphering unit is used for adding and close MAC Address of pre-defined algorithm and local zone time by key;
Parameter increases the unit, be used for according to MAC Address and local zone time that the terminal use of download request is arranged, and the MAC Address of encrypting and local zone time increases predefined parameter with file URL.
In addition, the download request authentication unit can comprise:
The predefined parameter extraction unit is used for downloading from the checking that the terminal use that download request is arranged who receives sends whether active data extracts predefined parameter;
The time judging unit is used to judge whether the terminal use's that download request is arranged local zone time surpasses predetermined scope, then returns failed download to the terminal use that download request is arranged if surpass predetermined scope;
The parameter judging unit, be used for if surpass the predefined parameter that predetermined scope judges that then the key that comprises by downloader and pre-defined algorithm obtain, predefined parameter among the URL that sends with the terminal use that download request is arranged compares, if inequalityly then return failed download to the terminal use that download request is arranged;
If data transmission unit is used for the identical data that then send request to the terminal use that download request is arranged.
This embodiment at first sends downloader by downloader transmitting element 41 to the terminal use that download request is arranged, and downloader is used for sending checking and whether downloads active data and the data that send request to the terminal use that download request is arranged; Receive checking that terminal use that download request is arranged sends by download request authentication unit 42 then and whether download active data, and download the validity of active data whether sends data from request to the terminal use that download request is arranged according to checking.In the download request authentication unit, downloader can obtain MAC Address and the local zone time that the unit acquisition has the terminal use of download request by MAC Address and time; Add and close MAC Address of pre-defined algorithm and local zone time by key by ciphering unit; Increase the unit according to MAC Address and local zone time that the terminal use of download request is arranged by parameter, and the MAC Address of encrypting and local zone time increase predefined parameter with file URL.Whether the download request authentication unit can be downloaded by the checking that the predefined parameter extraction unit sends from the terminal use that download request is arranged who receives and extract predefined parameter the active data; There is the terminal use's of download request local zone time whether to surpass predetermined scope by the time judgment unit judges, then returns failed download to the terminal use that download request is arranged if surpass predetermined scope; Then judge the predefined parameter that obtains by the key that comprises in the downloader and pre-defined algorithm by the parameter judging unit if surpass predetermined scope, predefined parameter among the URL that sends with the terminal use that download request is arranged compares, if inequalityly then return failed download to the terminal use that download request is arranged; By data transmission unit if the identical data that then send request to the terminal use that download request is arranged.
The embodiment of the processing capacity of each unit that comprises in the above-mentioned terminal is described in method execution mode before, no longer is repeated in this description at this.
The above; only for the preferable embodiment of the present invention, but protection scope of the present invention is not limited thereto, and anyly is familiar with those skilled in the art in the technical scope that the present invention discloses; the variation that can expect easily or replacement all should be encompassed within protection scope of the present invention.Therefore, protection scope of the present invention should be as the criterion with the protection range of claims.

Claims (9)

1. the method for a door chain is characterized in that, comprising:
Send downloader to the terminal use that download request is arranged, described downloader is used for sending checking and whether downloads active data, and the data that send request to the described terminal use that download request arranged;
Receive checking that the described terminal use that download request arranged sends and whether download active data, and the validity of downloading active data whether according to described checking sends the data of request to the described terminal use that download request arranged.
2. method according to claim 1 is characterized in that, described checking is downloaded active data whether and comprised by the described increase that obtains by described key and pre-defined algorithm of downloading the URL of predefined parameter.
3. method according to claim 1 is characterized in that, the described URL that obtains to have increased predefined parameter by described key and pre-defined algorithm that downloads comprises:
Acquisition has the terminal use's of download request MAC Address and local zone time;
Encrypt described MAC Address and local zone time by key and pre-defined algorithm;
According to described MAC Address and the local zone time that the terminal use of download request is arranged, and the MAC Address of described encryption and local zone time are increased in the parameter of file URL.
4. according to any described method of claim 1-3, it is characterized in that, receive checking that the described terminal use that download request arranged sends and whether download active data, and the validity of downloading active data whether according to described checking sends requested packets to the described terminal use that download request arranged and draws together:
Whether the checking that sends from the terminal use that download request is arranged who receives is downloaded and is extracted predefined parameter the active data;
Whether the local zone time of judging the described terminal use that download request arranged surpasses predetermined scope, then has the terminal use of download request to return failed download to described if surpass predetermined scope;
Then judge the predefined parameter that obtains by the key that comprises in the downloader and pre-defined algorithm if surpass predetermined scope, predefined parameter among the URL that sends with the described terminal use that download request arranged compares, if inequality then have the terminal use of download request to return failed download to described;
If the identical data that then send request to the described terminal use that download request arranged.
5. the terminal of a door chain is characterized in that, comprising:
The downloader transmitting element is used for sending downloader to the terminal use that download request is arranged, and described downloader is used for sending checking and whether downloads active data, and the data that send request to the described terminal use that download request arranged;
The download request authentication unit, be used to receive checking that the described terminal use that download request arranged sends and whether download active data, and the validity of downloading active data whether according to described checking sends the data of request to the described terminal use that download request arranged.
6. terminal according to claim 5 is characterized in that, in the downloader transmitting element, described downloader comprise download, file URL and key.
7. terminal according to claim 5 is characterized in that, in the download request authentication unit, described checking is downloaded active data whether and comprised by the described increase that obtains by described key and pre-defined algorithm of downloading the URL of predefined parameter.
8. terminal according to claim 5 is characterized in that, in the download request authentication unit, described downloader comprises:
MAC Address and time obtain the unit, are used to obtain the terminal use's of download request MAC Address and local zone time;
Ciphering unit is used for encrypting described MAC Address and local zone time by key and pre-defined algorithm;
Parameter increases the unit, is used for the MAC Address and the local zone time that the terminal use of download request are arranged according to described, and the MAC Address of described encryption and local zone time increase predefined parameter with file URL.
9. according to any described terminal of claim 5-7, it is characterized in that described download request authentication unit comprises:
The predefined parameter extraction unit is used for downloading from the checking that the terminal use that download request is arranged who receives sends whether active data extracts predefined parameter;
The time judging unit, being used to judge describedly has the terminal use's of download request local zone time whether to surpass predetermined scope, then has the terminal use of download request to return failed download to described if surpass predetermined scope;
The parameter judging unit, be used for if surpass the predefined parameter that predetermined scope judges that then the key that comprises by downloader and pre-defined algorithm obtain, predefined parameter among the URL that sends with the described terminal use that download request arranged compares, if inequality then have the terminal use of download request to return failed download to described;
If data transmission unit is used for the identical data that then send request to the described terminal use that download request arranged.
CN2009102358994A 2009-10-29 2009-10-29 Anti-leech method and terminal Pending CN102055752A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2009102358994A CN102055752A (en) 2009-10-29 2009-10-29 Anti-leech method and terminal

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2009102358994A CN102055752A (en) 2009-10-29 2009-10-29 Anti-leech method and terminal

Publications (1)

Publication Number Publication Date
CN102055752A true CN102055752A (en) 2011-05-11

Family

ID=43959680

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2009102358994A Pending CN102055752A (en) 2009-10-29 2009-10-29 Anti-leech method and terminal

Country Status (1)

Country Link
CN (1) CN102055752A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036924A (en) * 2011-09-29 2013-04-10 深圳市快播科技有限公司 Chaining processing method and chaining processing system
CN103561040A (en) * 2013-11-15 2014-02-05 中国科学院声学研究所 File downloading method and system
CN104079531A (en) * 2013-03-26 2014-10-01 中国移动通信集团公司 Hotlinking detection method, system and device
CN104184804A (en) * 2014-08-12 2014-12-03 北京京东尚科信息技术有限公司 Cloud storage system and system and method for downloading/providing data from cloud storage system
CN104469496A (en) * 2014-12-11 2015-03-25 北京国双科技有限公司 Hotlinking detection method and device applied to video player
CN104811773A (en) * 2015-04-28 2015-07-29 天脉聚源(北京)传媒科技有限公司 Hotlinking prevention-based channel playing implementation method, system and equipment
CN105827673A (en) * 2015-01-05 2016-08-03 中国移动通信集团浙江有限公司 Link theft preventing method, link theft preventing device, and network server
CN105930338A (en) * 2016-03-31 2016-09-07 乐视控股(北京)有限公司 Anti-hotlinking method and system
WO2017096840A1 (en) * 2015-12-07 2017-06-15 乐视控股(北京)有限公司 Method and device for detecting hotlinking
CN107517252A (en) * 2017-08-22 2017-12-26 福建中金在线信息科技有限公司 A kind of file download control method, apparatus and system
US10212166B2 (en) 2014-03-24 2019-02-19 Huawei Technologies Co., Ltd. File downloading method, apparatus, and system
CN110213054A (en) * 2018-02-28 2019-09-06 贵州白山云科技股份有限公司 A kind of method and server of door chain

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036924A (en) * 2011-09-29 2013-04-10 深圳市快播科技有限公司 Chaining processing method and chaining processing system
CN103036924B (en) * 2011-09-29 2017-02-22 深圳市云帆世纪科技有限公司 Chaining processing method and chaining processing system
CN104079531A (en) * 2013-03-26 2014-10-01 中国移动通信集团公司 Hotlinking detection method, system and device
CN103561040A (en) * 2013-11-15 2014-02-05 中国科学院声学研究所 File downloading method and system
US10212166B2 (en) 2014-03-24 2019-02-19 Huawei Technologies Co., Ltd. File downloading method, apparatus, and system
CN104184804A (en) * 2014-08-12 2014-12-03 北京京东尚科信息技术有限公司 Cloud storage system and system and method for downloading/providing data from cloud storage system
CN104184804B (en) * 2014-08-12 2018-07-06 北京京东尚科信息技术有限公司 Cloud storage system and its offer and the system and method from its downloading data
CN104469496B (en) * 2014-12-11 2018-04-03 北京国双科技有限公司 Robber's chain detection method and device for video player
CN104469496A (en) * 2014-12-11 2015-03-25 北京国双科技有限公司 Hotlinking detection method and device applied to video player
CN105827673A (en) * 2015-01-05 2016-08-03 中国移动通信集团浙江有限公司 Link theft preventing method, link theft preventing device, and network server
CN105827673B (en) * 2015-01-05 2019-03-12 中国移动通信集团浙江有限公司 A kind of method, apparatus and network server of door chain
CN104811773A (en) * 2015-04-28 2015-07-29 天脉聚源(北京)传媒科技有限公司 Hotlinking prevention-based channel playing implementation method, system and equipment
CN104811773B (en) * 2015-04-28 2017-12-15 天脉聚源(北京)传媒科技有限公司 Channel based on door chain plays implementation method, system and equipment
WO2017096840A1 (en) * 2015-12-07 2017-06-15 乐视控股(北京)有限公司 Method and device for detecting hotlinking
CN105930338A (en) * 2016-03-31 2016-09-07 乐视控股(北京)有限公司 Anti-hotlinking method and system
CN107517252A (en) * 2017-08-22 2017-12-26 福建中金在线信息科技有限公司 A kind of file download control method, apparatus and system
CN110213054A (en) * 2018-02-28 2019-09-06 贵州白山云科技股份有限公司 A kind of method and server of door chain
CN110213054B (en) * 2018-02-28 2020-06-23 贵州白山云科技股份有限公司 Anti-stealing-link method and server
CN111355744A (en) * 2018-02-28 2020-06-30 贵州白山云科技股份有限公司 Using method and operation method of anti-stealing-link server
CN111355744B (en) * 2018-02-28 2022-06-03 贵州白山云科技股份有限公司 Using method and operation method of anti-stealing-link server

Similar Documents

Publication Publication Date Title
CN102055752A (en) Anti-leech method and terminal
CN101997685B (en) Single sign-on method, single sign-on system and associated equipment
CN103036924B (en) Chaining processing method and chaining processing system
CN101465735B (en) Network user identification verification method, server and client terminal
CN106341429B (en) A kind of authentication method for protecting server data safety
CN101335626B (en) Multi-stage authentication method and multi-stage authentication system
CN103188207B (en) A kind of cross-domain single sign-on realization method and system
CN103024740B (en) Method and system for accessing internet by mobile terminal
CN1878170A (en) Method and device for managing session identifiers
CN103763308A (en) Method and device for having access to webpage safely and downloading data through intelligent terminal
CN103944890A (en) Virtual interaction system and method based on client/server mode
CN101309293A (en) Authentication method and system based on hypertext transmission protocol
CN103188248A (en) Identity authentication system and method based on single sign-on
CA2379082A1 (en) Secure cache of web session information using web browser cookies
WO2012136083A1 (en) System and method for accessing third-party applications based on cloud platform
CN102916970B (en) Network-based PIN cache method
CN105808990B (en) Method and apparatus based on the control URL access of IOS system
CN104283903A (en) Downloading method for files and device thereof
CN109218334B (en) Data processing method, device, access control equipment, authentication server and system
CN102263784A (en) SSO (signal sign on) method and system
CN112491695A (en) File sharing method and system
CN102891863A (en) Data reading and writing method
CN107026828B (en) Anti-stealing-link method based on Internet cache and Internet cache
CN105187417B (en) Authority acquiring method and apparatus
CN105827673B (en) A kind of method, apparatus and network server of door chain

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C12 Rejection of a patent application after its publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20110511