CN103701796A - Hotlink protection system and method on basis of HASH technology - Google Patents
Hotlink protection system and method on basis of HASH technology Download PDFInfo
- Publication number
- CN103701796A CN103701796A CN201310715062.6A CN201310715062A CN103701796A CN 103701796 A CN103701796 A CN 103701796A CN 201310715062 A CN201310715062 A CN 201310715062A CN 103701796 A CN103701796 A CN 103701796A
- Authority
- CN
- China
- Prior art keywords
- visitor
- hash value
- access
- request
- hash
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Landscapes
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
The invention provides a hotlink protection system and a hotlink protection method on the basis of a HASH technology. A link address of a website is subjected to differentiation on the basis of the characteristics of a visitor by a HASH algorithm; by utilizing the characteristic that a HASH value is irregular and unpredictable, is generated unidirectionally and cannot be cracked, the HASH value generated on the basis of characteristic information of the visitor is added into a link which the visitor requests to access in a parameter mode and then hotlinking is judged according to the HASH value. The hotlink protection system and the hotlink protection method have the beneficial effects that the link requested by the visitor cannot be changed, the service logic of the website is not influenced and a convenient and rapid using effect is ensured; in principle, the hotlink protection system and the hotlink protection method solve the problem that when a plurality of visitors use the same agency to access the website, due to the same IP (Internet Protocol) of the visitors, the visitors cannot be distinguished. The hotlink protection system and the hotlink protection method have high feasibility; most websites can implement the hotlink protection system and the hotlink protection method by simple technologies such as a filter, and influence cannot be caused on original services of the websites.
Description
Technical field
The present invention relates to internet security field, relate in particular to a kind of anti-stealing link system and method based on HASH technology.
Background technology
Flourish along with the Internet, a large amount of safety problems are arisen at the historic moment, and stealing chain is exactly one side wherein.Steal chain and refer to that service provider oneself does not provide the content of service, by technological means, walk around other gainful end-user interface (as advertisement), directly on the website of oneself, to end user, provide other service provider's service content, gain browsing and clicking rate of end user by cheating.Beneficiary does not provide resource or resource is seldom provided, and real service provider can not get any income.Chain is stolen in website can a large amount of bandwidth that consume stolen chain website, and the real clicking rate that brings stolen chain website is very little, grievous injury the interests of stolen chain website.Furthermore, if steal chain website, also have the flames such as pornographic, reaction, more can the fame of stolen chain website and user's use be caused and be had a strong impact on.
The anti-stealing link method of main flow is that the referer header of asking according to HTTP judges request at present.Referer header has been pointed out the source (as: coming from which page) of current request, when the station address in referer header (as: domain name) is different from current domain name, is judged to be robber's chain.
This method has certain advantage, but in practical operation, has significant limitation: first, because http protocol is expressly, steal the value that chain person is easy to set by technological means oneself referer header, make it consistent with the domain name of stolen chain website; Secondly, if there are a plurality of websites that have respectively different second level domains on a Web server simultaneously, the normal access that the method can affect between second level domain website is mutual, causes being mistaken for robber's chain by the access of second level domain.
Early stage in internet development, robber's chain generally appears at some smaller websites and steals on the address of some strong large websites, the target of stealing chain is more targeted, and be accompanied by the development of the Internet, some large-scale websites have also started the sight of robber's chain to be locked on whole the Internet, steal the bandwidth of other machine on whole the Internet.And because large-scale website has more outstanding technical conditions and advantage, therefore existing door chain technology can not meet the door chain demand in the actual use in website, provide a kind of novel door chain technology imperative.
Summary of the invention
The technical problem that will solve of the present invention is to provide a kind of anti-stealing link system and method based on HASH technology, can realize website, a kind of high efficient and reliable ground door chain solution.
Generation unit, for generating a corresponding HASH value according to visitor's characteristic information;
Append unit, for the HASH value that described generation unit is generated, with the form of parameter, be appended to the link of respective page;
Screening unit, for judging whether visitor's request comprises HASH value parameter, this HASH value parameter generates according to the unique characteristic information that proposes the visitor of new request; If have, this HASH value parameter is filtered out as the 2nd HASH value and enters next step; If nothing, server denied access person's request;
Judging unit, for the 2nd HASH value and a HASH value are compared, if the 2nd HASH value is consistent with a HASH value, server responds visitor's request and turns to the normal page, if inconsistent, server denied access person's request.
Further, also comprise independently blacklist unit, for recording the visitor's without HASH value parameter that described screening unit filters out access channel, and the 2nd HASH value judged of judging unit and an inconsistent visitor of HASH value access channel.
Further, also comprise independently white list unit, for recording the characteristic information of particular visitors, when visitor's characteristic information meets the characteristic information storing in white list unit, skip screening unit and judging unit and make server directly respond visitor's request, this visitor's access being carried out to record simultaneously.
Further, also comprise and be located at screening unit time limit and authentication unit before, whether correctly for the request that judges visitor, whether exceed the identifying code that access time limit or visitor's request carries, if it is incorrect that visitor's request exceeds the identifying code that access time limit or visitor's request carries, server denied access person's request turn to the wrong page; If visitor's request is correct at the identifying code of accessing in the time limit and visitor's request is carried, enters screening unit and carry out next step judgement.
Preferably, also comprise the retrieval unit of being located at before generation unit, for according to access channel or visitor's characteristic information in described blacklist unit or white list unit retrieve, thereby judge that access request is whether in blacklist or white list; When visitor's access channel is in blacklist, server is refused its access request and is turned to the wrong page; When visitor's characteristic information is in white list, server directly responds visitor's request and turns to the normal page; Other situations notify described generation unit to carry out the operation that generates a HASH value.
Preferably, described visitor's characteristic information comprises one of following or combination in any: visitor's MAC address, visitor IP address, object MAC address, object IP address, source physical port number, destination interface, the protocol type of Ethernet protocol, protocol number.
The present invention also provides a kind of anti-stealing link method based on HASH technology, comprises the steps:
Visitor is first during access websites, and server extracts visitor's characteristic information;
The visitor's who extracts according to server characteristic information generates a HASH value of answering in contrast;
Form by a described HASH value with parameter is appended to after the link of visitor institute request access;
Visitor makes after the action of access request, by screening unit, whether visitor's access request is comprised to the judgement of HASH value, if there is not HASH value in access request, stop visitor's access request, if there is HASH value in access request, carry out next step;
From visitor's access request, extract HASH value as the 2nd HASH value;
The 2nd HASH value and the HASH value being attached to after access links with parametric form are compared, if two HASH values are identical, server carries out corresponding and enters normal flow access request, if two HASH values are different, and this request of server refusal response.
Further, comprise the following steps: if there is not HASH value in access request, or the 2nd HASH value is from a HASH value when different, by the access channel record of this access request to blacklist; When visitor proposes access request, first judge that this visitor's access channel is whether in blacklist, if directly refuse its access request.
Further, comprise the following steps: by default permission directly the visitor's of access characteristic information be stored to white list, when visitor proposes access request, first judge that this visitor's characteristic information is whether in white list, if so, directly for it specifies access entrance.
Preferably, it is further comprising the steps: before the 2nd HASH value and a HASH value are compared, whether whether the access request that first judges visitor exceeds the identifying code that access time limit or visitor's access request carries correct, when visitor's access request exceeds the access time limit or when the identifying code that carries is incorrect, directly refuses this visitor's access request.
Beneficial effect of the present invention is: by the feature of utilizing irregular, unpredictable, the unidirectional generation of HASH value, cannot cracking, form by the HASH value generating based on visitor's characteristic information with parameter is appended to after the link of visitor institute request access, and judges stealing chain according to HASH.The present invention can not change the link that visitor asks, and does not affect website service logic, has guaranteed convenience, result of use easily; For generating the washability variation of visitor's characteristic information of HASH value, reduced significantly the possibility of its stolen chain, and from principle, solved a plurality of visitors and use same agency to conduct interviews to website, the identical and problem that causes being distinguished of visitor IP.Feasibility of the present invention is high, and most of websites can be realized by simple techniques such as filters, can not impact the original business in website.
?
figure of description
Fig. 1 is the structured flowchart of a kind of anti-stealing link system one embodiment based on HASH technology of the present invention;
Fig. 2 is the flow chart of a kind of anti-stealing link method one embodiment based on HASH technology of the present invention;
Fig. 3 is the flow chart of a kind of one embodiment of the anti-stealing link method based on HASH technology with time limit and authentication unit of the present invention;
Fig. 4 is the flow chart of a kind of one embodiment of the anti-stealing link method based on HASH technology with blacklist unit of the present invention;
Fig. 5 is the flow chart of a kind of one embodiment of the anti-stealing link method based on HASH technology with white list unit of the present invention.
Embodiment
In order to make object of the present invention, technical scheme and advantage clearer, below in conjunction with accompanying drawing, the present invention is further elaborated.Should be appreciated that specific embodiment described herein, only in order to explain the present invention, is not intended to limit the present invention.
The present invention be by HASH algorithm by the chained address of website the feature based on visitor carry out differential, the feature that utilize irregular, unpredictable, the unidirectional generation of HASH value, cannot crack, form by the HASH value generating based on visitor's characteristic information with parameter is appended to after the link of visitor institute request access, and judges stealing chain according to HASH value.
Embodiment mono-
Fig. 1 is the structured flowchart of a kind of anti-stealing link system one embodiment based on HASH technology of the present invention, and as shown in Figure 1, the anti-stealing link system based on HASH technology in the present invention comprises:
Generation unit, for generating a corresponding HASH value according to visitor's characteristic information;
Append unit, for the HASH value that described generation unit is generated, with the form of parameter, be appended to the link of respective page;
Screening unit, for judging whether visitor's request comprises HASH value parameter, this HASH value parameter generates according to the unique characteristic information that proposes the visitor of new request; If have, this HASH value parameter is filtered out as the 2nd HASH value and enters next step; If nothing, server denied access person's request turn to the wrong page;
Judging unit, for the 2nd HASH value and a HASH value are compared, if the 2nd HASH value is consistent with a HASH value, server responds visitor's request and turns to the normal page, if inconsistent, server denied access person's request turn to the wrong page.
Wherein, visitor's characteristic information comprises one of following or combination in any: visitor's MAC address, visitor IP address, object MAC address, object IP address, source physical port number, destination interface, the protocol type of Ethernet protocol, protocol number.According to the combination of different visitor's characteristic informations and different HASH value generating algorithms, can accomplish each independently visitor all have independently HASH value information, thereby when judgement there will not be fail to judge, the situation such as erroneous judgement occurs.
During actual use, its flow process as shown in Figure 2.
Visitor is first during access websites, and server extracts visitor's characteristic information;
The visitor's who extracts according to server characteristic information generates a HASH value of answering in contrast;
Form by a described HASH value with parameter is appended to after the link of visitor institute request access;
Visitor makes after the action of access request, by screening unit, whether visitor's access request is comprised to the judgement of HASH value, if there is not HASH value in access request, stop visitor's access request, if there is HASH value in access request, carry out next step;
From visitor's access request, extract HASH value as the 2nd HASH value;
The 2nd HASH value and the HASH value being attached to after access links with parametric form are compared, if two HASH values are identical, server carries out corresponding and enters normal flow access request, if two HASH values are different, and this request of server refusal response.
Embodiment bis-
Fig. 3 is the flow chart of a kind of one embodiment of the anti-stealing link method based on HASH technology with time limit and authentication unit of the present invention, as shown in Figure 3, before screening unit, be provided with time limit and authentication unit, for before carrying out HASH value judgement, whether the request that judges visitor exceeds whether access the identifying code that time limit or visitor's request carries correct.Its operational process is as follows:
Visitor is first during access websites, and server extracts visitor's characteristic information;
The visitor's who extracts according to server characteristic information generates a HASH value of answering in contrast;
Form by the described HASH value generating with parameter is appended to after the link of visitor institute request access;
Visitor makes after the action of access request, whether correctly first by time limit and authentication unit, judge whether visitor's request exceeds the identifying code that access time limit or visitor's request carries, when visitor's request exceeds the access time limit or when the identifying code that carries is incorrect, directly refuses this visitor's request;
After time limit and authentication unit judgement, whether visitor's access request is comprised to the judgement of HASH value, if there is not HASH value in access request, stop visitor's access request, if there is HASH value in access request, carry out next step;
From visitor's access request, extract HASH value as the 2nd HASH value;
The 2nd HASH value and the HASH value being attached to after access links with parametric form are compared, if two HASH values are identical, server carries out corresponding and enters normal flow access request, if two HASH values are different, and this request of server refusal response.
Embodiment tri-
Fig. 4 is the flow chart of a kind of one embodiment of the anti-stealing link method based on HASH technology with blacklist unit of the present invention, and as shown in Figure 4, native system further comprises independently blacklist unit and retrieval unit.Wherein blacklist unit is for recording the visitor's without HASH value parameter that described screening unit filters out access channel, and the 2nd HASH value judged of judging unit and an inconsistent visitor of HASH value access channel, thereby stop other visitors to carry out subsequent access by same access channel.Retrieval unit is for according to blacklist unit, access channel and visitor's characteristic information being retrieved, thereby judges that access request is whether in blacklist.Its operational process is as follows:
Visitor is first during access websites, and server extracts visitor's characteristic information;
By retrieval unit, when visitor proposes access request, carried out preposition judgement, if its access is originated channel in blacklist unit, server is refused its access request and is turned to the wrong page.
The visitor's who extracts according to server characteristic information generates a HASH value of answering in contrast;
Form by a described HASH value with parameter is appended to after the link of visitor institute request access;
Visitor makes after the action of generation access request such as clicking access links or submission form, by screening unit, whether visitor's access request is comprised to the judgement of HASH value, if there is not HASH value in access request, stop visitor's access request, if there is HASH value in access request, carry out next step;
From visitor's access request, extract HASH value as the 2nd HASH value;
The 2nd HASH value and the HASH value that is attached to after access links with parametric form are compared, if two HASH values are different, server refusal responds this and asks, and by the access channel record of this access request to blacklist unit; If two HASH values are identical, server carries out corresponding and enters normal flow access request.
Embodiment tetra-
Fig. 4 is the flow chart of an embodiment of a kind of anti-stealing link method based on HASH technology with blacklist unit of the present invention, as shown in Figure 4, native system further comprises independently white list unit, for recording the characteristic information of particular visitors, when visitor's characteristic information meets the characteristic information storing in white list unit, skip screening unit and judging unit and make server directly respond visitor's request, this visitor's access being carried out to record simultaneously.Its operational process is as follows:
Visitor is first during access websites, and server extracts visitor's characteristic information;
By retrieval unit, when proposing access request, visitor carried out preposition judgement, if its visitor's characteristic information, in white list unit, is directly permitted its access request, if not in white list unit, continue next step.
The visitor's who extracts according to server characteristic information generates a HASH value of answering in contrast;
Form by a described HASH value with parameter is appended to after the link of visitor institute request access;
Visitor makes after the action of access request, by screening unit, whether visitor's access request is comprised to the judgement of HASH value, if there is not HASH value in access request, stop visitor's access request, if there is HASH value in access request, carry out next step;
From visitor's access request, extract HASH value as the 2nd HASH value;
The 2nd HASH value and the HASH value being attached to after access links with parametric form are compared, if two HASH values are identical, server carries out corresponding and enters normal flow access request, if two HASH values are different, and this request of server refusal response.
Each embodiment in the specific embodiment of the invention can be used by juxtaposition, blacklist unit, retrieval unit, white list unit, time limit and authentication unit and HASH technology are incorporated into one, by the feature of utilizing irregular, unpredictable, the unidirectional generation of HASH value, cannot cracking, form by the HASH value generating based on visitor's characteristic information with parameter is appended to after the link of visitor institute request access, and judges stealing chain according to HASH.The present invention can not change the link that visitor asks, and does not affect website service logic, has guaranteed convenience, result of use easily; For generating the washability variation of visitor's characteristic information of HASH value, reduced significantly the possibility of its stolen chain, and from principle, solved a plurality of visitors and use same agency to conduct interviews to website, the identical and problem that causes being distinguished of visitor IP.Feasibility of the present invention is high, and most of websites can be realized by simple techniques such as filters, can not impact the original business in website.
Finally it should be noted that obviously, those skilled in the art can carry out various changes and modification and not depart from the spirit and scope of the present invention the present invention.Like this, if within of the present invention these are revised and modification belongs to the scope of the claims in the present invention and equivalent technologies thereof, the present invention is also intended to comprise these changes and modification.
Claims (10)
1. the anti-stealing link system based on HASH technology, is characterized in that, comprising:
Generation unit, for generating a corresponding HASH value according to visitor's characteristic information;
Append unit, for the HASH value that described generation unit is generated, with the form of parameter, be appended to the link of respective page;
Screening unit, for judging whether visitor's request comprises HASH value parameter, this HASH value parameter generates according to the unique characteristic information that proposes the visitor of new request; If have, this HASH value parameter is filtered out as the 2nd HASH value and enters next step; If nothing, server denied access person's request;
Judging unit, for the 2nd HASH value and a HASH value are compared, if the 2nd HASH value is consistent with a HASH value, server responds visitor's request and turns to the normal page, if inconsistent, server denied access person's request.
2. a kind of anti-stealing link system based on HASH technology according to claim 1, it is characterized in that, also comprise independently blacklist unit, for recording the visitor's without HASH value parameter that described screening unit filters out access channel, and the 2nd HASH value judged of judging unit and an inconsistent visitor of HASH value access channel.
3. a kind of anti-stealing link system based on HASH technology according to claim 1, it is characterized in that, also comprise independently white list unit, for recording the characteristic information of particular visitors, when visitor's characteristic information meets the characteristic information storing in white list unit, skip screening unit and judging unit and make server directly respond visitor's request, this visitor's access being carried out to record simultaneously.
4. a kind of anti-stealing link system based on HASH technology according to claim 1, it is characterized in that, also comprise and be located at screening unit time limit and authentication unit before, whether correctly for the request that judges visitor, whether exceed the identifying code that access time limit or visitor's request carries, if it is incorrect that visitor's request exceeds the identifying code that access time limit or visitor's request carries, server denied access person's request turn to the wrong page; If visitor's request is correct at the identifying code of accessing in the time limit and visitor's request is carried, enters screening unit and carry out next step judgement.
5. according to a kind of anti-stealing link system based on HASH technology described in claim 2 or 3, it is characterized in that, also comprise and be located at generation unit retrieval unit before, for according to access channel or visitor's characteristic information in described blacklist unit or white list unit retrieve, thereby judge that access request is whether in blacklist or white list; When visitor's access channel is in blacklist, server is refused its access request and is turned to the wrong page; When visitor's characteristic information is in white list, server directly responds visitor's request and turns to the normal page; Other situations notify described generation unit to carry out the operation that generates a HASH value.
6. a kind of anti-stealing link system based on HASH technology according to claim 1, it is characterized in that, described visitor's characteristic information comprises one of following or combination in any: visitor's MAC address, visitor IP address, object MAC address, object IP address, source physical port number, destination interface, the protocol type of Ethernet protocol, protocol number.
7. the anti-stealing link method based on HASH technology, is characterized in that, comprises the steps:
Visitor is first during access websites, and server extracts visitor's characteristic information;
The visitor's who extracts according to server characteristic information generates a HASH value of answering in contrast;
Form by a described HASH value with parameter is appended to after the link of visitor institute request access;
Visitor makes after the action of access request, by screening unit, whether visitor's access request is comprised to the judgement of HASH value, if there is not HASH value in access request, stop visitor's access request, if there is HASH value in access request, carry out next step;
From visitor's access request, extract HASH value as the 2nd HASH value;
The 2nd HASH value and the HASH value being attached to after access links with parametric form are compared, if two HASH values are identical, server carries out corresponding and enters normal flow access request, if two HASH values are different, and this request of server refusal response.
8. a kind of anti-stealing link method based on HASH technology according to claim 7, it is characterized in that, further comprising the steps: if there is not HASH value in access request, or the 2nd HASH value is from a HASH value when different, by the access channel record of this access request to blacklist; When visitor proposes access request, first judge that this visitor's access channel is whether in blacklist, if directly refuse its access request.
9. a kind of anti-stealing link method based on HASH technology according to claim 7, it is characterized in that, further comprising the steps: the visitor's that default permission is directly accessed characteristic information is stored to white list, when visitor proposes access request, first judge that this visitor's characteristic information is whether in white list, if so, directly for it specifies access entrance.
10. a kind of anti-stealing link method based on HASH technology according to claim 7, it is characterized in that, it is further comprising the steps: before the 2nd HASH value and a HASH value are compared, whether whether the access request that first judges visitor exceeds the identifying code that access time limit or visitor's access request carries correct, when visitor's access request exceeds the access time limit or when the identifying code that carries is incorrect, directly refuses this visitor's access request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310715062.6A CN103701796A (en) | 2013-12-23 | 2013-12-23 | Hotlink protection system and method on basis of HASH technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310715062.6A CN103701796A (en) | 2013-12-23 | 2013-12-23 | Hotlink protection system and method on basis of HASH technology |
Publications (1)
Publication Number | Publication Date |
---|---|
CN103701796A true CN103701796A (en) | 2014-04-02 |
Family
ID=50363193
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310715062.6A Pending CN103701796A (en) | 2013-12-23 | 2013-12-23 | Hotlink protection system and method on basis of HASH technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103701796A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104079429A (en) * | 2014-05-22 | 2014-10-01 | 汉柏科技有限公司 | Hotlinking prevention method based on referer field and Web gateway |
CN104486342A (en) * | 2014-12-19 | 2015-04-01 | 山东中创软件商用中间件股份有限公司 | Hidden form protection method, device, server and online shopping platform |
CN105827673A (en) * | 2015-01-05 | 2016-08-03 | 中国移动通信集团浙江有限公司 | Link theft preventing method, link theft preventing device, and network server |
CN105893873A (en) * | 2016-03-31 | 2016-08-24 | 乐视控股(北京)有限公司 | Hotlink protection method and system based on Blond filter query optimization |
WO2017080166A1 (en) * | 2015-11-13 | 2017-05-18 | 乐视控股(北京)有限公司 | Anti-hotlinking method and system |
CN107846405A (en) * | 2017-10-31 | 2018-03-27 | 北京百悟科技有限公司 | The control system and implementation method that intranet and extranet file is exchanged visits |
CN110311907A (en) * | 2019-06-28 | 2019-10-08 | 苏州浪潮智能科技有限公司 | A kind of cloud platform instead chain method and apparatus |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1801824A (en) * | 2006-01-16 | 2006-07-12 | 北京北方烽火科技有限公司 | Anti-theft chain method for WEB service |
CN101695164A (en) * | 2009-09-28 | 2010-04-14 | 华为技术有限公司 | Verification method, device and system for controlling resource access |
CN101815060A (en) * | 2009-02-23 | 2010-08-25 | 未序网络科技(上海)有限公司 | Anti-stealing link method of internet content delivery network |
CN102045348A (en) * | 2010-12-01 | 2011-05-04 | 北京迅捷英翔网络科技有限公司 | Link stealing prevention system and method |
CN102752300A (en) * | 2012-06-28 | 2012-10-24 | 用友软件股份有限公司 | Dynamic antitheft link system and dynamic antitheft link method |
CN103067409A (en) * | 2013-01-21 | 2013-04-24 | 中国科学院信息工程研究所 | World wide web (WEB) hotlinking protection method and gateway system thereof |
-
2013
- 2013-12-23 CN CN201310715062.6A patent/CN103701796A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1801824A (en) * | 2006-01-16 | 2006-07-12 | 北京北方烽火科技有限公司 | Anti-theft chain method for WEB service |
CN101815060A (en) * | 2009-02-23 | 2010-08-25 | 未序网络科技(上海)有限公司 | Anti-stealing link method of internet content delivery network |
CN101695164A (en) * | 2009-09-28 | 2010-04-14 | 华为技术有限公司 | Verification method, device and system for controlling resource access |
CN102045348A (en) * | 2010-12-01 | 2011-05-04 | 北京迅捷英翔网络科技有限公司 | Link stealing prevention system and method |
CN102752300A (en) * | 2012-06-28 | 2012-10-24 | 用友软件股份有限公司 | Dynamic antitheft link system and dynamic antitheft link method |
CN103067409A (en) * | 2013-01-21 | 2013-04-24 | 中国科学院信息工程研究所 | World wide web (WEB) hotlinking protection method and gateway system thereof |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104079429A (en) * | 2014-05-22 | 2014-10-01 | 汉柏科技有限公司 | Hotlinking prevention method based on referer field and Web gateway |
CN104486342A (en) * | 2014-12-19 | 2015-04-01 | 山东中创软件商用中间件股份有限公司 | Hidden form protection method, device, server and online shopping platform |
CN105827673A (en) * | 2015-01-05 | 2016-08-03 | 中国移动通信集团浙江有限公司 | Link theft preventing method, link theft preventing device, and network server |
CN105827673B (en) * | 2015-01-05 | 2019-03-12 | 中国移动通信集团浙江有限公司 | A kind of method, apparatus and network server of door chain |
WO2017080166A1 (en) * | 2015-11-13 | 2017-05-18 | 乐视控股(北京)有限公司 | Anti-hotlinking method and system |
CN105893873A (en) * | 2016-03-31 | 2016-08-24 | 乐视控股(北京)有限公司 | Hotlink protection method and system based on Blond filter query optimization |
CN107846405A (en) * | 2017-10-31 | 2018-03-27 | 北京百悟科技有限公司 | The control system and implementation method that intranet and extranet file is exchanged visits |
CN110311907A (en) * | 2019-06-28 | 2019-10-08 | 苏州浪潮智能科技有限公司 | A kind of cloud platform instead chain method and apparatus |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103701796A (en) | Hotlink protection system and method on basis of HASH technology | |
JP7222036B2 (en) | Model training system and method and storage medium | |
AU2010204563B2 (en) | Requesting offline profile data for online use in a privacy-sensitive manner | |
CN104038346B (en) | A kind of verification method and system | |
CN104917716B (en) | Page security management method and device | |
CA3099355C (en) | System and method for providing customized response messages based on requested website | |
CN102891826B (en) | The control method of web page access, equipment and system | |
CN102404741B (en) | Method and device for detecting abnormal online of mobile terminal | |
CN103036924B (en) | Chaining processing method and chaining processing system | |
WO2015013459A1 (en) | Systems and methods for managing network resource requests | |
US20170300453A1 (en) | System and method of providing notification of suspicious access attempts | |
CN107241292B (en) | Vulnerability detection method and device | |
US20150067772A1 (en) | Apparatus, method and computer-readable storage medium for providing notification of login from new device | |
US12022296B2 (en) | Network cyber-security platform | |
CN106982430B (en) | Portal authentication method and system based on user use habits | |
KR101576632B1 (en) | System, apparatus, method and computer readable recording medium for detecting and treating illegal access | |
CN106899561A (en) | A kind of TNC authority control methods and system based on ACL | |
TW201928750A (en) | Collation server, collation method, and computer program | |
CN107819579A (en) | A kind of processing method, server and the computer-readable recording medium of user's request | |
WO2019052469A1 (en) | Network request processing method and apparatus, electronic device, and storage medium | |
WO2016201994A1 (en) | Method and device for determining domain name credibility | |
CN102404331A (en) | Method for judging whether website is maliciously tampered | |
JP5569819B2 (en) | Cybercrime detection prevention system | |
JP5743822B2 (en) | Information leakage prevention device and restriction information generation device | |
CN109379344A (en) | The method for authenticating and authentication server of access request |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20140402 |