CN105827673A - Link theft preventing method, link theft preventing device, and network server - Google Patents

Link theft preventing method, link theft preventing device, and network server Download PDF

Info

Publication number
CN105827673A
CN105827673A CN201510004464.4A CN201510004464A CN105827673A CN 105827673 A CN105827673 A CN 105827673A CN 201510004464 A CN201510004464 A CN 201510004464A CN 105827673 A CN105827673 A CN 105827673A
Authority
CN
China
Prior art keywords
terminal
resource
request
address
user profile
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510004464.4A
Other languages
Chinese (zh)
Other versions
CN105827673B (en
Inventor
蒋海滨
郑文彬
戴和忠
陈学
胡凌鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Zhejiang Co Ltd
Original Assignee
China Mobile Group Zhejiang Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Zhejiang Co Ltd filed Critical China Mobile Group Zhejiang Co Ltd
Priority to CN201510004464.4A priority Critical patent/CN105827673B/en
Publication of CN105827673A publication Critical patent/CN105827673A/en
Application granted granted Critical
Publication of CN105827673B publication Critical patent/CN105827673B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Small-Scale Networks (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides a link theft preventing method, a link theft preventing device, and a network server. The method comprises the following steps: receiving an access request sent by a terminal; acquiring the user information of the terminal and the actual address of a requested resource according to the access request, and generating and saving an identifier for identifying the access request; generating a special address according to the identifier, and sending the special address to the terminal; receiving a resource request sent by the terminal according to the special address; verifying whether the user information of the terminal sending the resource request and the user information of the terminal sending the access request are consistent according to the saved user information of the terminal and the identifier, and carrying out resource requesting based on the actual address of the requested resource if the user information of the terminal sending the resource request and the user information of the terminal sending the access request are consistent; and after resource requesting succeeds, deleting the saved identifier, the user information of the terminal and the actual address of the requested resource. The scheme of the invention ensures that the resource requests posed by users are from the same user and/or the browser of the same user, the posed resource requests are one-off, and the difficulty of link theft is improved greatly.

Description

A kind of method of door chain, device and the webserver
Technical field
The present invention relates to field of network data transmission technology, particularly relate to a kind of method of door chain, device and the webserver.
Background technology
Along with the swift and violent growth of Internet user, increasing website uses the mode stealing chain to enrich the resource of self.Therefore the many content and service provider of order feel more pressure, because the resource being placed on oneself server differs surely used by oneself.Sometimes the content server paralysis case caused because of robber's chain is the most too numerous to enumerate.
As shown in Figure 1, the down sending content mechanism of normal generic web page picture or other guide is that user asks picture the most in the industry, corresponding caricature door, i.e. web application server can issue corresponding content link (UniformResourceLocator, URL), user side goes to download relevant image content according to link zone content server.According to this kind of mode, stealing the technical staff of this content of chain, as long as obtaining URL by packet capturing, i.e. content " can be taken into one's own possession ".
Additionally, some website processing mode is to increase watermark to picture during picture is uploaded onto the server.Although protecting picture copyright to a certain extent, but on the one hand destroying the quality of picture itself, the most not alleviating and stealing the impact that chain itself brings.
After some website processing mode is request content server, add user agent (UserAgent, UA) information.The mechanism of door chain there is also leak, and the website of robber's chain only need to add a UA and can break through with linking mapping table.
Summary of the invention
The technical problem to be solved in the present invention is to provide a kind of method of door chain, device and the webserver, ensure that resource request that user proposes is from same user and/or the browser of same user, and the resource request proposed is disposable, it is possible to effectively prevent from stealing the generation of chain situation.
In order to solve above-mentioned technical problem, the present invention adopts the following technical scheme that
According to one aspect of the present invention, it is provided that a kind of method of door chain, including:
Receiving the access request that terminal sends, described access request includes resource and the user profile of terminal of the required request of terminal;
Obtain user profile and the actual address of requested resource of described terminal according to described access request, generate the identifier for identifying described access request, and all preserve;
Generate special address according to described identifier, and be sent to described terminal;
Receiving the resource request that terminal sends according to described special address, described resource request includes the user profile sending the terminal of resource request;
According to user profile and the identifier of the terminal preserved, it is the most consistent with the user profile of the terminal sending access request that checking sends the user profile of the terminal of resource request, if unanimously, carries out resource request with the actual address of requested resource;
After resource request success, delete described identifier, the user profile of terminal and the actual address of requested resource preserved.
Wherein, the user profile of described terminal includes that medium education (MAC) address of terminal and/or browser client act on behalf of UA information.
Wherein, obtain user profile and the actual address of requested resource of described terminal according to described access request, generate the identifier for identifying described access request, and the step all carrying out preserving includes:
The described identifier that will generate, the actual address of the MAC Address of the described terminal obtained and/or the resource of browser UA information and terminal request forms key-value to key value, and preserve in the caches, wherein key includes described identifier, and value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
Wherein, generate special address according to described identifier, and the step being sent to described terminal include:
Extract the key of described key-value, and described key is encrypted the special address of formation, and be sent to described terminal.
Wherein, user profile and identifier according to the terminal preserved, it is the most consistent with the user profile of the terminal sending access request that checking sends the user profile of the terminal of resource request, if unanimously, the step carrying out resource request with the actual address of requested resource includes:
Decipher described special address, extract described key, and obtain MAC Address and/or the browser UA information of the terminal initiating resource request;
Corresponding key-value is searched according to the described key extracted;
When inquiring the key-value of correspondence, it is judged that MAC Address and/or the browser UA information of the terminal of the described transmission resource request of acquisition are the most consistent with the MAC Address of the terminal that described value includes and/or browser UA information;
If judging consistent, carry out resource request with the actual address of requested resource.
Wherein, after resource request goes out successfully, the step of the actual address deleting the described identifier, the user profile of terminal and the requested resource that preserve includes:
After resource request success, delete the described key value preserved in cache.
According to another aspect of the present invention, additionally provide the device of a kind of door chain, including:
First receiver module, for receiving the access request that terminal sends, described access request includes resource and the user profile of terminal of the required request of terminal;
Memory module, for obtaining user profile and the actual address of requested resource of described terminal according to described access request, generates the identifier for identifying described access request, and all preserves;
Sending module, for generating special address according to described identifier, and is sent to described terminal;
Second receiver module, for receiving the resource request that terminal sends according to described special address, described resource request includes the user profile sending the terminal of resource request;
Authentication module, user profile and identifier for the terminal according to preservation, it is the most consistent with the user profile of the terminal sending access request that checking sends the user profile of the terminal of resource request, if unanimously, carries out resource request with the actual address of requested resource;
Removing module, after resource request success, for deleting the described identifier of preservation, the user profile of terminal and the actual address of requested resource.
Wherein, the user profile of described terminal includes that the MAC address of terminal and/or browser client act on behalf of UA information.
Wherein, described memory module is further used for:
The described identifier that will generate, the actual address of the MAC Address of the described terminal obtained and/or the resource of browser UA information and terminal request forms key-value to key value, and preserve in the caches, wherein key includes described identifier, and value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
Wherein, described sending module is further used for: extract the key of described key-value, and described key is encrypted the special address of formation, and be sent to described terminal.
Wherein, described authentication module includes:
Decryption unit, is used for deciphering described special address, extracts described key, and obtains MAC Address and/or the browser UA information of the terminal initiating resource request;
Search unit, for searching corresponding key-value according to the described key extracted;
Judging unit, for when inquiring the key-value of correspondence, it is judged that MAC Address and/or the browser UA information of the terminal of the described transmission resource request of acquisition are the most consistent with the MAC Address of the terminal that described value includes and/or browser UA information;
Processing unit, if consistent for judging, carries out resource request with the actual address of requested resource.
Wherein, described removing module is further used for:
After resource request success, delete the described key value preserved in cache.
According to another aspect of the present invention, additionally provide a kind of webserver, including the device of door chain described above.
The invention has the beneficial effects as follows:
The method of the door chain of the embodiment of the present invention, is processed by the access request sending terminal, obtains resource actual address in the server and the user profile of terminal of end-user request, and generates the identifier that can uniquely identify this access request.When terminal sends resource request with the special address that generates according to identifier to server, the user profile of the terminal that access request that server is identified with the identifier of storage is corresponding compares, and when contrasting consistent, terminal just can carry out resource request with actual address.
Because special address does not include requested resource actual address in the server, even if so the technical staff stealing this content of chain intercepts and captures this special address in intermediate link, still cannot successfully obtain the particular content of requested resource.
Additionally, the method for the door chain of the present invention, after resource request success, the actual address of identifier, the user profile of terminal and requested resource can be deleted so that access content server once after, this link was lost efficacy immediately.
Accompanying drawing explanation
Fig. 1 represents the down sending content mechanism principle schematic diagram of Web page picture in prior art;
Fig. 2 represents the method flow schematic diagram of the door chain of the embodiment of the present invention;
Fig. 3 represents the apparatus structure block diagram of the door chain of the embodiment of the present invention;
Fig. 4 represents the structured flowchart of authentication module.
Detailed description of the invention
It is more fully described the exemplary embodiment of the disclosure below with reference to accompanying drawings.Although accompanying drawing showing the exemplary embodiment of the disclosure, it being understood, however, that may be realized in various forms the disclosure and should not limited by embodiments set forth here.On the contrary, it is provided that these embodiments are able to be best understood from the disclosure, and complete for the scope of the present disclosure can be conveyed to those skilled in the art.
Embodiment one
An aspect according to the embodiment of the present invention, it is provided that a kind of method of door chain, first the method, receives the access request that terminal sends;Then, obtain user profile and the actual address of requested resource of described terminal according to described access request, generate the identifier for identifying described access request, and all preserve;Again, generate special address according to described identifier, and be sent to described terminal;Again, the resource request that terminal sends is received according to described special address;Again, according to user profile and the identifier of the terminal preserved, it is the most consistent with the user profile of the terminal sending access request that checking sends the user profile of the terminal of resource request, if unanimously, carries out resource request with the actual address of requested resource;After last resource request success, delete described identifier, the user profile of terminal and the actual address of requested resource preserved.
As in figure 2 it is shown, the method includes:
The access request that step S201, reception terminal send.
Wherein, access request carries resource and the user profile of terminal of the required request of terminal.
Alternatively, the user profile of described terminal includes that the MAC address of terminal and/or browser client act on behalf of UA information.
When terminal use is at request HTML (HyperTextMarkuplanguage, HTML) during the page, such as relating to the contents such as picture need to access content server time, then server needs to obtain MAC Address and/or the browser UA information of terminal use according to the access request of terminal use.Wherein, browser UA information is used for the different browsers of distinguishing terminal, and same terminal installs different browsers then different UA values.
Step S203, obtain the user profile of described terminal and the actual address of requested resource according to described access request, generate the identifier for identifying described access request, and all preserve.
Alternatively, step S203 includes:
The described identifier that will generate, the actual address of the MAC Address of the described terminal obtained and/or the resource of browser UA information and terminal request forms key-value to key value, and preserve in the caches, wherein key includes described identifier, and value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
The method of the door chain of the embodiment of the present invention, by generating the key-value corresponding with the access request each time of terminal use, and preserves in the caches, it is ensured that the access request each time of terminal use has unique key.Wherein, the key in key-value, including the identifier of terminal use, it is used for identifying this access request of user.Wherein, identifier can be a random number.
Step S205, generate special address according to described identifier, and be sent to described terminal.
Alternatively, step S205 includes:
Extract the key of described key-value, and described key is encrypted the special address of formation, and be sent to described terminal.
In the method for the door chain of the embodiment of the present invention, the special address generated is by key, i.e. identifier, is formed after encryption, ciphering process therein further increases the difficulty stealing chain, but the method for the door chain of the embodiment of the present invention the most specifically limits AES therein.
In addition, terminal use after server sends access request, the special address carrying unique identifier identifying this access request is sent to terminal by server, owing to this special address not including requested resource actual address in the server, even if so the technical staff stealing this content of chain intercepts and captures this special address in intermediate link, still cannot successfully obtain the particular content of requested resource.
The resource request that step S207, reception terminal send according to described special address.
Wherein, described resource request includes the user profile sending the terminal of resource request.
The user profile of the terminal that step S209, foundation preserve and identifier, it is the most consistent with the user profile of the terminal sending access request that checking sends the user profile of the terminal of resource request, if unanimously, carries out resource request with the actual address of requested resource.
Alternatively, step S209 includes:
Decipher described special address, extract described key, and obtain MAC Address and/or the browser UA information of the terminal initiating resource request;
Corresponding key-value is searched according to the described key extracted;
When inquiring the key-value of correspondence, it is judged that MAC Address and/or the browser UA information of the terminal of the described transmission resource request of acquisition are the most consistent with the MAC Address of the terminal that described value includes and/or browser UA information;
If judging consistent, carry out resource request with the actual address of requested resource.
The method of the door chain of the embodiment of the present invention, when terminal use initiates resource request with special address to server, server is by deciphering and extracts the key in special address, obtain MAC Address and/or the browser UA information of the user proposing resource request, look for whether in the caches according to key information to there is corresponding key-value, if not existing, resource acquisition failure, when there is corresponding key-value, in contrast caching, MAC Address and/or the browser UA information of the user in value value are the most identical with the MAC Address of the terminal use of the initiation resource request got and/or browser UA information, if identical, replace the request address of user to server request resource with actual address.
After the success of step S211, resource request, delete described identifier, the user profile of terminal and the actual address of requested resource preserved.
Optionally, when the actual address of identifier, the user profile of terminal and requested resource is preserved in the caches with key-value form, after resource request success, the key value preserved in cache can be deleted, after making access content server once, link was lost efficacy immediately, effectively prevent the generation stealing chain situation.
Embodiment two
According to another aspect of the embodiment of the present invention, additionally provide the device of a kind of door chain, as it is shown on figure 3, this device 300 includes:
First receiver module 301, for receiving the access request that terminal sends, described access request includes resource and the user profile of terminal of the required request of terminal;
Memory module 303, for receiving the access request that terminal sends, described access request includes resource and the user profile of terminal of the required request of terminal;
Sending module 305, for generating special address according to described identifier, and is sent to described terminal;
Second receiver module 307, for receiving the resource request that terminal sends according to described special address, described resource request includes the user profile sending the terminal of resource request;
Authentication module 309, user profile and identifier for the terminal according to preservation, it is the most consistent with the user profile of the terminal sending access request that checking sends the user profile of the terminal of resource request, if unanimously, carries out resource request with the actual address of requested resource;
Removing module 311, after resource request success, deletes described identifier, the user profile of terminal and the actual address of requested resource preserved.
Alternatively, the user profile of described terminal includes that the MAC address of terminal and/or browser client act on behalf of UA information.
Alternatively, described memory module 303 is further used for:
The described identifier that will generate, the actual address of the MAC Address of the described terminal obtained and/or the resource of browser UA information and terminal request forms key-value to key value, and preserve in the caches, wherein key includes described identifier, and value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
Alternatively, described sending module 305 is further used for:
Extract the key of described key-value, and described key is encrypted the special address of formation, and be sent to described terminal.
Alternatively, as shown in Figure 4, described authentication module 309 includes:
Decryption unit 3091, is used for deciphering described special address, extracts described key, and obtains MAC Address and/or the browser UA information of the terminal initiating resource request;
Search unit 3092, for searching corresponding key-value according to the described key extracted;
Judging unit 3093, for when inquiring the key-value of correspondence, it is judged that MAC Address and/or the browser UA information of the terminal of the described transmission resource request of acquisition are the most consistent with the MAC Address of the terminal that described value includes and/or browser UA information;
Processing unit 3094, if consistent for judging, carries out resource request with the actual address of requested resource.
Alternatively, described removing module 311 is further used for:
After resource request success, delete the described key value preserved in cache.
Embodiment three
According to another aspect of the embodiment of the present invention, additionally provide a kind of webserver, including the device of door chain described above.
Above-described is the preferred embodiment of the present invention; should be understood that for the ordinary person of the art; can also make some improvements and modifications under without departing from principle premise of the present invention, these improvements and modifications are the most within the scope of the present invention.

Claims (13)

1. the method for a door chain, it is characterised in that including:
Receiving the access request that terminal sends, described access request includes resource and the user profile of terminal of the required request of terminal;
Obtain user profile and the actual address of requested resource of described terminal according to described access request, generate the identifier for identifying described access request, and all preserve;
Generate special address according to described identifier, and be sent to described terminal;
Receiving the resource request that terminal sends according to described special address, described resource request includes the user profile sending the terminal of resource request;
According to user profile and the identifier of the terminal preserved, it is the most consistent with the user profile of the terminal sending access request that checking sends the user profile of the terminal of resource request, if unanimously, carries out resource request with the actual address of requested resource;
After resource request success, delete described identifier, the user profile of terminal and the actual address of requested resource preserved.
2. the method for claim 1, it is characterised in that the user profile of described terminal includes that the MAC address of terminal and/or browser client act on behalf of UA information.
3. method as claimed in claim 2, it is characterised in that obtain user profile and the actual address of requested resource of described terminal according to described access request, generates the identifier for identifying described access request, and the step all carrying out preserving includes:
The described identifier that will generate, the actual address of the MAC Address of the described terminal obtained and/or the resource of browser UA information and terminal request forms key-value to key value, and preserve in the caches, wherein key includes described identifier, and value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
4. method as claimed in claim 3, it is characterised in that generate special address according to described identifier, and the step being sent to described terminal includes:
Extract the key of described key-value, and described key is encrypted the special address of formation, and be sent to described terminal.
5. method as claimed in claim 4, it is characterized in that, user profile and identifier according to the terminal preserved, it is the most consistent with the user profile of the terminal sending access request that checking sends the user profile of the terminal of resource request, if consistent, the step carrying out resource request with the actual address of requested resource includes:
Decipher described special address, extract described key, and obtain MAC Address and/or the browser UA information of the terminal initiating resource request;
Corresponding key-value is searched according to the described key extracted;
When inquiring the key-value of correspondence, it is judged that MAC Address and/or the browser UA information of the terminal of the described transmission resource request of acquisition are the most consistent with the MAC Address of the terminal that described value includes and/or browser UA information;
If judging consistent, carry out resource request with the actual address of requested resource.
6. method as claimed in claim 3, it is characterised in that after resource request success, the step of the actual address deleting the described identifier, the user profile of terminal and the requested resource that preserve includes:
After resource request success, delete the described key value preserved in cache.
7. the device of a door chain, it is characterised in that including:
First receiver module, for receiving the access request that terminal sends, described access request includes resource and the user profile of terminal of the required request of terminal;
Memory module, for obtaining user profile and the actual address of requested resource of described terminal according to described access request, generates the identifier for identifying described access request, and all preserves;
Sending module, for generating special address according to described identifier, and is sent to described terminal;
Second receiver module, for receiving the resource request that terminal sends according to described special address, described resource request includes the user profile sending the terminal of resource request;
Authentication module, user profile and identifier for the terminal according to preservation, it is the most consistent with the user profile of the terminal sending access request that checking sends the user profile of the terminal of resource request, if unanimously, carries out resource request with the actual address of requested resource;
Removing module, after resource request success, deletes described identifier, the user profile of terminal and the actual address of requested resource preserved.
8. device as claimed in claim 7, it is characterised in that the user profile of described terminal includes that the MAC address of terminal and/or browser client act on behalf of UA information.
9. device as claimed in claim 8, it is characterised in that described memory module is further used for:
The described identifier that will generate, the actual address of the MAC Address of the described terminal obtained and/or the resource of browser UA information and terminal request forms key-value to key value, and preserve in the caches, wherein key includes described identifier, and value includes the actual address of the resource of terminal request, the MAC Address of terminal and/or browser UA information.
10. device as claimed in claim 9, it is characterised in that described sending module is further used for: extract the key of described key-value, and described key is encrypted the special address of formation, and be sent to described terminal.
11. devices as claimed in claim 10, it is characterised in that described authentication module includes:
Decryption unit, is used for deciphering described special address, extracts described key, and obtains MAC Address and/or the browser UA information of the terminal initiating resource request;
Search unit, for searching corresponding key-value according to the described key extracted;
Judging unit, for when inquiring the key-value of correspondence, it is judged that MAC Address and/or the browser UA information of the terminal of the described transmission resource request of acquisition are the most consistent with the MAC Address of the terminal that described value includes and/or browser UA information;
Processing unit, if consistent for judging, carries out resource request with the actual address of requested resource.
12. devices as claimed in claim 9, it is characterised in that described removing module is further used for:
After resource request success, delete the described key value preserved in cache.
13. 1 kinds of webservers, it is characterised in that include the device of door chain as described in claim 7~12 any one.
CN201510004464.4A 2015-01-05 2015-01-05 A kind of method, apparatus and network server of door chain Active CN105827673B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510004464.4A CN105827673B (en) 2015-01-05 2015-01-05 A kind of method, apparatus and network server of door chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510004464.4A CN105827673B (en) 2015-01-05 2015-01-05 A kind of method, apparatus and network server of door chain

Publications (2)

Publication Number Publication Date
CN105827673A true CN105827673A (en) 2016-08-03
CN105827673B CN105827673B (en) 2019-03-12

Family

ID=56513695

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510004464.4A Active CN105827673B (en) 2015-01-05 2015-01-05 A kind of method, apparatus and network server of door chain

Country Status (1)

Country Link
CN (1) CN105827673B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107026828A (en) * 2016-02-02 2017-08-08 中国移动通信集团辽宁有限公司 A kind of anti-stealing link method cached based on internet and internet caching
CN108574686A (en) * 2017-05-17 2018-09-25 北京金山云网络技术有限公司 A kind of method and device of online preview file
CN110365688A (en) * 2019-07-19 2019-10-22 湖南快乐阳光互动娱乐传媒有限公司 Anti-stealing-link method and device
WO2023093772A1 (en) * 2021-11-24 2023-06-01 贵州白山云科技股份有限公司 Request scheduling method and apparatus, electronic device, and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102025749A (en) * 2011-01-18 2011-04-20 中国联合网络通信集团有限公司 Anti-theft method of mobile streaming media service
CN102055752A (en) * 2009-10-29 2011-05-11 腾讯科技(深圳)有限公司 Anti-leech method and terminal
CN103701796A (en) * 2013-12-23 2014-04-02 山东中创软件商用中间件股份有限公司 Hotlink protection system and method on basis of HASH technology
CN104009989A (en) * 2014-05-22 2014-08-27 Tcl集团股份有限公司 Link-stealing-prevention method and system for media files and server
US20140351762A1 (en) * 2013-05-21 2014-11-27 Samsung Electronics Co., Ltd. Method and apparatus for performing url linkage function using the keypad

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102055752A (en) * 2009-10-29 2011-05-11 腾讯科技(深圳)有限公司 Anti-leech method and terminal
CN102025749A (en) * 2011-01-18 2011-04-20 中国联合网络通信集团有限公司 Anti-theft method of mobile streaming media service
US20140351762A1 (en) * 2013-05-21 2014-11-27 Samsung Electronics Co., Ltd. Method and apparatus for performing url linkage function using the keypad
CN103701796A (en) * 2013-12-23 2014-04-02 山东中创软件商用中间件股份有限公司 Hotlink protection system and method on basis of HASH technology
CN104009989A (en) * 2014-05-22 2014-08-27 Tcl集团股份有限公司 Link-stealing-prevention method and system for media files and server

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107026828A (en) * 2016-02-02 2017-08-08 中国移动通信集团辽宁有限公司 A kind of anti-stealing link method cached based on internet and internet caching
CN107026828B (en) * 2016-02-02 2020-02-21 中国移动通信集团辽宁有限公司 Anti-stealing-link method based on Internet cache and Internet cache
CN108574686A (en) * 2017-05-17 2018-09-25 北京金山云网络技术有限公司 A kind of method and device of online preview file
CN108574686B (en) * 2017-05-17 2021-08-06 北京金山云网络技术有限公司 Method and device for previewing file online
CN110365688A (en) * 2019-07-19 2019-10-22 湖南快乐阳光互动娱乐传媒有限公司 Anti-stealing-link method and device
CN110365688B (en) * 2019-07-19 2022-06-07 湖南快乐阳光互动娱乐传媒有限公司 Anti-stealing-link method and device
WO2023093772A1 (en) * 2021-11-24 2023-06-01 贵州白山云科技股份有限公司 Request scheduling method and apparatus, electronic device, and storage medium

Also Published As

Publication number Publication date
CN105827673B (en) 2019-03-12

Similar Documents

Publication Publication Date Title
CN107341160B (en) Crawler intercepting method and device
CN104283903B (en) The method for down loading and device of file
CN107046544B (en) Method and device for identifying illegal access request to website
CN105635064B (en) CSRF attack detection method and device
US20100306184A1 (en) Method and device for processing webpage data
CN105827673A (en) Link theft preventing method, link theft preventing device, and network server
CN101639880A (en) File test method and device
CN102055752A (en) Anti-leech method and terminal
CN111818196B (en) Domain name resolution method and device, computer equipment and storage medium
CN104021349B (en) Network evidence security method and secure device in advance
KR101329034B1 (en) System and method for collecting url information using retrieval service of social network service
CN108156270B (en) Domain name request processing method and device
EP2002362A2 (en) Method and system for providing improved url mangling performance using fast re-write
CN106101155B (en) Method and device for protecting website
CN106878345A (en) A kind of method and device for distorting protection
CN112364274A (en) WEB site access acceleration method and device
CN109818906B (en) Equipment fingerprint information processing method and device and server
CN113904810B (en) Privacy protection safety browsing method
CN107026828B (en) Anti-stealing-link method based on Internet cache and Internet cache
CN103873493A (en) Method, device and system for page information verification
CN106612283B (en) Method and device for identifying source of downloaded file
US20210014298A1 (en) Message display method and device, and storage medium
US10079856B2 (en) Rotation of web site content to prevent e-mail spam/phishing attacks
CN105490993B (en) Method and device for preventing Cookie tracking in browser
US10999322B1 (en) Anti-phishing system and method using computer vision to match identifiable key information

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant