CN105871799A - Anti-stealing-link method and device - Google Patents

Anti-stealing-link method and device Download PDF

Info

Publication number
CN105871799A
CN105871799A CN201510850216.1A CN201510850216A CN105871799A CN 105871799 A CN105871799 A CN 105871799A CN 201510850216 A CN201510850216 A CN 201510850216A CN 105871799 A CN105871799 A CN 105871799A
Authority
CN
China
Prior art keywords
authorisation device
device mark
data acquisition
acquisition request
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510850216.1A
Other languages
Chinese (zh)
Inventor
李茗
赵瑞前
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeTV Cloud Computing Co Ltd
Original Assignee
LeTV Cloud Computing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Cloud Computing Co Ltd filed Critical LeTV Cloud Computing Co Ltd
Priority to CN201510850216.1A priority Critical patent/CN105871799A/en
Publication of CN105871799A publication Critical patent/CN105871799A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/101Access control lists [ACL]

Abstract

The embodiment of the invention provides an anti-stealing-link method and device, and relates to the technical field of the internet. The stealing-link problem of CDN (Content Delivery Network) service in the prior art is solved. The method provided by the embodiment of the invention comprises following steps of obtaining data obtaining requests sent by a client, wherein authorized device identifiers are carried in the data obtaining requests; counting request times of the authorized device identifiers in preset time; judging whether the request times reaches a times threshold value or not; and adding the authorized device identifiers to a blacklist if the judging result is yes. According to the embodiment of the method and the device, the CDN service is provided, and moreover, the anti-stealing-link purpose can be effectively carried out.

Description

A kind of method and device of door chain
Technical field
The present embodiments relate to Internet technical field, particularly relate to the method and device of a kind of door chain.
Background technology
Along with the development of Internet telephony, increasing people start to watch video frequency program on the net, but Be user watch the fluency of online video and viewing quality also need to by the network bandwidth, network speed, The impact of the network environments such as network traffics.Therefore, in order to improve the Consumer's Experience of viewing online video, just Need the link avoiding likely affecting data transmission bauds and stability on the Internet, make data content pass Defeated is the most more stable.
The manufacturer providing the user video content services at present on the market is the most, and for self-growth Need all can develop the software player of oneself, user just can be watched by the software player of manufacturer The video content services that manufacturer provides.Further, manufacturer, in order to attract user, can provide a user with more The video content services that block is more stable, some of which provides the manufacturer of video content services can set up oneself Content distributing network (Content Delivery Network, be called for short CDN) by the CDN system of oneself System provides a user with video content services.CDN system can be real-time according to network traffics and each node Connect, load state and the content that user sent to integrated informations such as the distance of user and response times The request of acquisition is re-directed on the service node that user is nearest, so that user can obtain required nearby The content wanted, solves the situation of network congestion, improves user and obtains the response speed of video content.
Owing to the technical research of CDN system is complicated and O&M cost is the highest, in the most much providing video The manufacturer holding service cannot set up the CDN system of oneself.But some little manufacturer obtains to reduce self The cost of video content and acquisition unlawful interests, it will usually simulation has the software player of CDN system Behavior and to the other side CDN system send video acquisition request, gratuitously obtain from the CDN system of the other side Take video content.Owing to CDN system is generally beyond recognition described request for general video acquisition request It is whether the request that sends of one's own side's software player, usually there will be the manufacturer that video content services is provided The situation of the stolen chain of CDN system occurs, and the most how to carry out effective while providing CDN service Door chain becomes current problem demanding prompt solution.
Summary of the invention
The embodiment of the present invention provides the method and device of a kind of door chain, in order to solve CDN in prior art The problem servicing stolen chain, it is achieved carry out the purpose of effective door chain while CDN service is provided.
According to first aspect of the embodiment of the present invention, the embodiment of the present invention provides a kind of method of door chain, Including:
Obtain the data acquisition request that client sends, described data acquisition request carries authorisation device Mark;
The request number of times of described authorisation device mark in statistics Preset Time;
Judge whether described request number of times reaches frequency threshold value;
If the determination result is YES, then limit in described authorisation device mark being piped off.
Further, the data acquisition request that described acquisition client sends, including:
Receive the data acquisition request that client sends;
Authorisation device mark is read from described data acquisition request.
Further, the request number of times of described authorisation device mark in described statistics Preset Time, including:
The authorisation device mark read from described data acquisition request is cached;
The request number of times of the described authorisation device mark of caching in statistics Preset Time.
Further, limit during described authorisation device mark is piped off, including:
Forbid that the data acquisition request to carrying described authorisation device mark responds.
Further, after limiting in described authorisation device mark is piped off, described side Method also includes:
When in statistics Preset Time, the request number of times of described authorisation device mark is decreased below described number of times threshold During value, by described authorisation device mark removal blacklist;
The data acquisition request that follow-up transmission is carried described authorisation device mark responds.
According to second aspect of the embodiment of the present invention, the embodiment of the present invention provides the device of a kind of door chain, Including:
Acquiring unit, for obtaining the data acquisition request that client sends, in described data acquisition request Carry authorisation device mark;
Statistic unit, the request number of times of described authorisation device mark in adding up Preset Time;
Judging unit, is used for judging whether described request number of times reaches frequency threshold value;
Processing unit, for when judged result is for being, identifies described authorisation device in piping off Limit.
Further, described acquiring unit includes:
Receiver module, for receiving the data acquisition request that client sends;
Read module, for reading authorisation device mark from described data acquisition request.
Further, described statistic unit includes:
Cache module, for caching the authorisation device mark read from described data acquisition request;
Statistical module, the request number of times of the described authorisation device mark of caching in adding up Preset Time.
Further, described processing unit is for forbidding the data acquisition carrying described authorisation device mark Request responds.
Further, described processing unit is additionally operable to when described authorisation device mark in statistics Preset Time When request number of times is decreased below described frequency threshold value, described authorisation device mark is removed blacklist, with And the data acquisition request that follow-up transmission is carried described authorisation device mark responds.
The method and device of the door chain that the embodiment of the present invention provides, it is possible to by obtaining what client sent The authorisation device mark carried in data acquisition request, and described authorisation device mark in adding up Preset Time Request number of times, if described request number of times reach set frequency threshold value, described authorisation device mark is described Knowing and there is exception request, it is likely to stolen, thus needs to list described authorisation device mark in black name List limits it and continues normal use.And in the prior art after authorisation device mark is stolen, arbitrarily Third party's client can use this authorisation device labelling to send data acquisition request to CDN server, Thus the phenomenon causing third party's client malice to obtain CDN content service occurs.Therefore with prior art Present in the defect of the stolen chain of CDN service compare, the embodiment of the present invention can effectively control authorisation device After mark loss, the risk of the stolen chain of CDN service, carries out effective door chain to CDN service.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to reality Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that under, Accompanying drawing during face describes is some embodiments of the present invention, for those of ordinary skill in the art, On the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
The flow chart of the method for a kind of door chain that Fig. 1 provides for the embodiment of the present invention;
The schematic diagram of the authorisation device mark statistical result that Fig. 2 provides for the embodiment of the present invention;
The composition frame chart of the device of a kind of door chain that Fig. 3 provides for the embodiment of the present invention;
The composition frame chart of the device of the another kind of door chain that Fig. 4 provides for the embodiment of the present invention;
The entity structure schematic diagram of a kind of server that Fig. 5 provides for the embodiment of the present invention.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with this Accompanying drawing in bright embodiment, is clearly and completely described the technical scheme in the embodiment of the present invention, Obviously, described embodiment is a part of embodiment of the present invention rather than whole embodiments.Based on Embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise The every other embodiment obtained, broadly falls into the scope of protection of the invention.
There is the manufacturer of multiple offer video content services at present on the market, some of which manufacturer can set up certainly Oneself content distributing network (Content Delivery Network is called for short CDN) by the CDN of oneself System provides a user with video content services.There is the manufacturer of CDN in order to prevent other manufacturers by simulation The behavior of self software player and to self CDN system send data acquisition request and gratuitously acquisition regard Frequently content, it will usually add authorisation device mark in the data acquisition request that self software player sends, Thus show that this request is to be sent by the software player of one's own side.But when described authorisation device mark is lost After mistake, any third party's player can use described authorisation device mark to send to self CDN system Data acquisition request thus malice obtains self data content.
In order to solve the problems referred to above, the embodiment of the present invention provides a kind of method of door chain, as it is shown in figure 1, Described method includes:
101, obtain the data acquisition request that client sends, data acquisition request carries authorisation device Mark.
In the prior art when user uses client to obtain data content, need by client to number Data acquisition request is sent, according to the address information in described data acquisition request from phase according to content supplier The server answered obtains the data content needed, and these contents are typically distributed on content distributing network CDN In.Owing to CDN O&M cost is higher, therefore manufacturer is in order to prevent other clients from usurping self CDN In data content, it will usually for self client distribute authorisation device mark, when own customers end to CDN server can carry authorisation device mark in described request when sending data acquisition request, for table Bright described data acquisition request is sent by one's own side's client, does not carries the data acquisition of authorisation device mark Request cannot obtain data content from CDN.Therefore, the embodiment of the present invention when carrying out door chain first Need to obtain the data acquisition request that client sends.
102, the request number of times of authorisation device mark in statistics Preset Time.
Although the data acquisition request that the client obtained in a step 101 sends carries authorisation device Mark, but the situation stealing authorisation device mark owing to there is also third party's client occurs, the most also Can not be completely secured and carry the data acquisition request of authorisation device mark must be the visitor of manufacturer belonging to CDN Family end sends.If authorisation device mark is usurped by third party's client, then CDN server may obtain Getting substantial amounts of malicious requests, therefore the embodiment of the present invention obtains, in step 101, the data that client sends After obtaining request, step 102 to be performed adds up the request number of times of authorisation device mark in Preset Time.
103, judge whether request number of times reaches frequency threshold value.
Owing to normally obtaining in CDN during data content in client, the data that client sends obtain Take the number of times of request be usually maintained in one normal in the range of, when the authorisation device of CDN server identifies After being stolen, any third party's client can use the authorisation device stolen to identify to CDN server Send data acquisition request, thus carry described mandate to what CDN server sent in causing a period of time The quantity of the data acquisition request of device identification is increased sharply and is exceeded client and send data acquisition request number of times Normal range.Therefore authorisation device mark in the embodiment of the present invention adds up Preset Time in a step 102 After request number of times, step 103 to be performed judges whether the request number of times that described authorisation device identifies reaches To frequency threshold value.Described frequency threshold value is that client sends data acquisition request number of times in Preset Time The maximum critical value of normal range.
104, if the determination result is YES, then limit in authorisation device mark being piped off.
When judging that the number of times carrying the data acquisition request of authorisation device mark reaches number of times in step 103 After threshold value, illustrating that described authorisation device mark is sending exception request, malice obtains the number in CDN According to content.Therefore the embodiment of the present invention carries, described in being judged by step 103, the number that authorisation device identifies According to obtain request number of times reach frequency threshold value after, need by described authorisation device mark pipe off from And limit described authorisation device mark and normally use.
The method of the door chain that the embodiment of the present invention provides, it is possible to the data sent by obtaining client obtain Take the authorisation device mark carried in request, and the request of described authorisation device mark in adding up Preset Time Number of times, if described request number of times reaches the frequency threshold value set, illustrates that described authorisation device mark exists Exception request, it is likely to stolen, thus the middle limit that needs to pipe off described authorisation device mark Make it and continue normal use.And in the prior art after authorisation device mark is stolen, any third party Client can use this authorisation device labelling to send data acquisition request to CDN server, thus makes The phenomenon becoming third party's client malice to obtain CDN content service occurs.Therefore exist with prior art The defect of the stolen chain of CDN service compare, the embodiment of the present invention can effectively control authorisation device mark and lose After mistake, the risk of the stolen chain of CDN service, carries out effective door chain to CDN service.
In order to preferably understand the method shown in above-mentioned Fig. 1, the embodiment of the present invention will be in Fig. 1 Each step be described in detail.
In existing client after CDN server sends data acquisition request, CDN server only can According to data acquisition request is carried for information about (such as address information, authorisation device identification information etc.) The data content needed is returned to client, but owing to authorisation device mark there will be stolen situation, Therefore prior art exists third party's client usurp authorisation device mark and malice from CDN server Middle acquisition data content.In order to overcome drawbacks described above, embodiments provide a kind of embodiment, Before the data acquisition request sent according to client obtains corresponding data content, need from data acquisition Request is read its authorisation device carried mark.In actual process, in order to not to CDN service The work of device interferes, and the embodiment of the present invention can control server, by frequency control by creating the frequency Control server receives the data acquisition request that client sends, and reads from described data acquisition request and award Power device identification.
Although the data acquisition request that client sends carries authorisation device mark, but can not protect Demonstrate,proving described data acquisition request is to be sent by the client of manufacturer belonging to CDN server.Award described in if Power device identification does not has stolen, then the number of times of the data acquisition request that the frequency controls server reception is usual Can be in normal range;If described authorisation device mark is stolen, then arbitrarily third party's client meeting Send substantial amounts of malicious requests, then the number of times that the frequency controls the data acquisition request that server receives is usual Can increase sharply and exceed normal range.Therefore to determine that the data acquisition carrying described authorisation device mark please Seeking Truth is no for malicious requests, and the embodiment of the present invention needs to add up the request number of times of authorisation device mark, Judge whether it reaches the frequency threshold value set.Described frequency threshold value is typically on the basis of a large amount of statistics The client obtained is normal (usually in the unit interval) in Preset Time sends data acquisition request number The maximum critical value of amount.In order to add up the request number of times of authorisation device mark, embodiments provide A kind of optional embodiment, is i.e. controlled server by from the data acquisition request received by the frequency created The authorisation device mark of middle reading caches, and adds up authorisation device in Preset Time from buffered results The request number of times of mark.Such as, if getting the number of times of authorisation device mark " le-1 " in Preset Time Being 5 times, the number of times of authorisation device mark " le-2 " is 3 times, the number of times of authorisation device mark " le-3 " It it is 20 times, then its statistical result can be preserved by form as shown in Figure 2.
When request number of times owing to identifying when a certain authorisation device in Preset Time reaches frequency threshold value, also It is exactly to reach the normal maximum critical value sending data acquisition request quantity in Preset Time, awards described in explanation There is exception request in power device identification, it is likely to stolen, it is therefore necessary to set described mandate Standby mark limits.As the optional embodiment of one, the embodiment of the present invention is judging Preset Time After the request number of times of interior a certain authorisation device mark reaches frequency threshold value, described authorisation device can be identified Limit in piping off.Described blacklist is used for recording transmission dystropic authorisation device mark, The authorisation device mark being in described blacklist will temporarily can not normally use, namely CDN server The data acquisition request of the authorisation device mark carried in blacklist will not be responded.
Authorisation device mark owing to being in blacklist can't be utilized by third party's client always, because of This carries the transmission times of the data acquisition request of authorisation device mark in blacklist also can tend to normal, It is less than described number of times threshold when carrying the transmission times of the data acquisition request of authorisation device mark in blacklist After value, in order to ensure that manufacturer's own customers end can normally use described authorisation device to identify, the present invention is real Execute example and provide a kind of optional embodiment, i.e. when the request of authorisation device mark in statistics Preset Time When number of times is decreased below described frequency threshold value, by described authorisation device mark removal blacklist, it is moved out of The authorisation device mark of blacklist can continue to normally use, and follow-up transmission can be carried by CDN server The data acquisition request of described authorisation device mark responds, thus ensures that client can take from CDN Business device gets the data content of needs.Same, when follow-up again count on Preset Time in authorize and set When the request number of times of standby mark reaches described frequency threshold value, in addition it is also necessary to described authorisation device mark is listed in black In list.
The embodiment of the present invention is identified by dynamically management authorisation device, the mandate too much by sending request number of times Device identification limits in piping off, and prevents having abnormal (stolen) sending request and awards Power device identification malice obtains data content from CDN server, and when the authorisation device in blacklist After the transmission request number of times of mark drops to normal range, the mark removal of normal authorisation device will be recovered black List, and then ensure that manufacturer's own customers end can normally use described authorisation device to identify.
As to the application of method shown in above-mentioned Fig. 1, the embodiment of the present invention provides the device of a kind of door chain, As it is shown on figure 3, described device includes: acquiring unit 31, statistic unit 32, judging unit 33 and Processing unit 34, wherein,
Acquiring unit 31, for obtaining the data acquisition request that client sends, described data acquisition request In carry authorisation device mark;
Statistic unit 32, the request number of times of described authorisation device mark in adding up Preset Time;
Judging unit 33, is used for judging whether described request number of times reaches frequency threshold value;
Processing unit 34, for when judged result is for being, pipes off described authorisation device mark In limit.
Further, as shown in Figure 4, acquiring unit 31 includes:
Receiver module 311, for receiving the data acquisition request that client sends;
Read module 312, for reading authorisation device mark from described data acquisition request.
Further, statistic unit 32 includes:
Cache module 321, for carrying out the authorisation device mark read from described data acquisition request Caching;
Statistical module 322, the request time of the described authorisation device mark of caching in adding up Preset Time Number.
Further, processing unit 34 is for forbidding that the data acquisition to carrying described authorisation device mark please Ask and respond.
Further, processing unit 34 is additionally operable to when asking that described authorisation device in statistics Preset Time identifies When asking number of times to be decreased below described frequency threshold value, by described authorisation device mark removal blacklist, and The data acquisition request that follow-up transmission is carried described authorisation device mark responds.
The device of the door chain that the embodiment of the present invention provides, it is possible to the data sent by obtaining client obtain Take the authorisation device mark carried in request, and the request of described authorisation device mark in adding up Preset Time Number of times, if described request number of times reaches the frequency threshold value set, illustrates that described authorisation device mark exists Exception request, it is likely to stolen, thus the middle limit that needs to pipe off described authorisation device mark Make it and continue normal use.And in the prior art after authorisation device mark is stolen, any third party Client can use this authorisation device labelling to send data acquisition request to CDN server, thus makes The phenomenon becoming third party's client malice to obtain CDN content service occurs.Therefore exist with prior art The defect of the stolen chain of CDN service compare, the embodiment of the present invention can effectively control authorisation device mark and lose After mistake, the risk of the stolen chain of CDN service, carries out effective door chain to CDN service.
Additionally, the device that the embodiment of the present invention provides is identified by dynamically management authorisation device, please by transmission The authorisation device mark asking number of times too much limits in piping off, and prevents having abnormal transmission and asks (stolen) authorisation device mark malice from CDN server, obtain data content, and when black After the transmission request number of times of the authorisation device mark in list drops to normal range, recovery is awarded normally Power device identification removal blacklist, and then ensure that manufacturer's own customers end can normally use described mandate to set Standby mark.
For the device of above-mentioned door chain it should be noted that use in every embodiment of the present invention is each The function of individual unit module can be passed through hardware processor (hardware processor) and realize.
Fig. 5 illustrates the entity structure schematic diagram of a kind of server, as it is shown in figure 5, this server is permissible Including: processor (processor) 510, communication interface (Communications Interface) 520, storage Device (memory) 530 and communication bus 540, wherein, processor 510, communication interface 520, memorizer 530 complete mutual communication by communication bus 540.Communication interface 520 may be used for service end with Information transmission between client.Processor 510 can call the logical order in memorizer 530, with Perform following method: terminal monitoring own power source state;When monitoring own power source state and changing, Terminal sends state synchronization request to opposite end;Opposite end receives the state synchronization request that terminal sends;Opposite end will The described state synchronization request received resolves;Opposite end is according to the parsing knot to described state synchronization request Fruit adjusts the power supply status of self.
Additionally, the logical order in above-mentioned memorizer 530 can be real by the form of SFU software functional unit Now and as independent production marketing or use time, a computer read/write memory medium can be stored in In.Based on such understanding, prior art is contributed by technical scheme the most in other words Part or the part of this technical scheme can embody with the form of software product, this computer is soft Part product is stored in a storage medium, including some instructions with so that a computer equipment (can To be personal computer, server, or the network equipment etc.) perform side described in each embodiment of the present invention All or part of step of method.And aforesaid storage medium includes: USB flash disk, portable hard drive, read-only storage Device (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), the various medium that can store program code such as magnetic disc or CD.
Device embodiment described above is only schematically, wherein said illustrates as separating component Unit can be or may not be physically separate, the parts shown as unit can be or Person may not be physical location, i.e. may be located at a place, or can also be distributed to multiple network On unit.Some or all of module therein can be selected according to the actual needs to realize the present embodiment The purpose of scheme.Those of ordinary skill in the art are not in the case of paying performing creative labour, the most permissible Understand and implement.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive each reality The mode of executing can add the mode of required general hardware platform by software and realize, naturally it is also possible to by firmly Part.Based on such understanding, the portion that prior art is contributed by technique scheme the most in other words Dividing and can embody with the form of software product, this computer software product can be stored in computer can Read in storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions with so that one Computer equipment (can be personal computer, server, or the network equipment etc.) performs each to be implemented The method described in some part of example or embodiment.
Last it is noted that above example is only in order to illustrate technical scheme, rather than to it Limit;Although the present invention being described in detail with reference to previous embodiment, the ordinary skill of this area Personnel it is understood that the technical scheme described in foregoing embodiments still can be modified by it, or Person carries out equivalent to wherein portion of techniques feature;And these amendments or replacement, do not make corresponding skill The essence of art scheme departs from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (10)

1. the method for a door chain, it is characterised in that described method includes:
Obtain the data acquisition request that client sends, described data acquisition request carries authorisation device Mark;
The request number of times of described authorisation device mark in statistics Preset Time;
Judge whether described request number of times reaches frequency threshold value;
If the determination result is YES, then limit in described authorisation device mark being piped off.
Method the most according to claim 1, it is characterised in that the number that described acquisition client sends According to obtaining request, including:
Receive the data acquisition request that client sends;
Authorisation device mark is read from described data acquisition request.
Method the most according to claim 2, it is characterised in that described in described statistics Preset Time The request number of times of authorisation device mark, including:
The authorisation device mark read from described data acquisition request is cached;
The request number of times of the described authorisation device mark of caching in statistics Preset Time.
Method the most according to claim 1, it is characterised in that described authorisation device mark is listed in Blacklist limits, including:
Forbid that the data acquisition request to carrying described authorisation device mark responds.
Method the most according to any one of claim 1 to 4, it is characterised in that awarding described After power device identification limits in piping off, described method also includes:
When in statistics Preset Time, the request number of times of described authorisation device mark is decreased below described number of times threshold During value, by described authorisation device mark removal blacklist;
The data acquisition request that follow-up transmission is carried described authorisation device mark responds.
6. the device of a door chain, it is characterised in that described device includes:
Acquiring unit, for obtaining the data acquisition request that client sends, in described data acquisition request Carry authorisation device mark;
Statistic unit, the request number of times of described authorisation device mark in adding up Preset Time;
Judging unit, is used for judging whether described request number of times reaches frequency threshold value;
Processing unit, for when judged result is for being, identifies described authorisation device in piping off Limit.
Device the most according to claim 6, it is characterised in that described acquiring unit includes:
Receiver module, for receiving the data acquisition request that client sends;
Read module, for reading authorisation device mark from described data acquisition request.
Device the most according to claim 7, it is characterised in that described statistic unit includes:
Cache module, for caching the authorisation device mark read from described data acquisition request;
Statistical module, the request number of times of the described authorisation device mark of caching in adding up Preset Time.
Device the most according to claim 6, it is characterised in that it is right that described processing unit is used for forbidding The data acquisition request carrying described authorisation device mark responds.
10. according to the device according to any one of claim 6 to 9, it is characterised in that described process Unit is additionally operable to when in statistics Preset Time, the request number of times of described authorisation device mark is decreased below described During frequency threshold value, by described authorisation device mark removal blacklist, and follow-up transmission is carried described The data acquisition request of authorisation device mark responds.
CN201510850216.1A 2015-11-27 2015-11-27 Anti-stealing-link method and device Pending CN105871799A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510850216.1A CN105871799A (en) 2015-11-27 2015-11-27 Anti-stealing-link method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510850216.1A CN105871799A (en) 2015-11-27 2015-11-27 Anti-stealing-link method and device

Publications (1)

Publication Number Publication Date
CN105871799A true CN105871799A (en) 2016-08-17

Family

ID=56623792

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510850216.1A Pending CN105871799A (en) 2015-11-27 2015-11-27 Anti-stealing-link method and device

Country Status (1)

Country Link
CN (1) CN105871799A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859149A (en) * 2005-08-02 2006-11-08 华为技术有限公司 Method for realizing stream medium business service
CN103986735A (en) * 2014-06-05 2014-08-13 北京赛维安讯科技发展有限公司 CDN (content distribution network) antitheft system and antitheft method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1859149A (en) * 2005-08-02 2006-11-08 华为技术有限公司 Method for realizing stream medium business service
CN103986735A (en) * 2014-06-05 2014-08-13 北京赛维安讯科技发展有限公司 CDN (content distribution network) antitheft system and antitheft method

Similar Documents

Publication Publication Date Title
CN109152095B (en) Wireless network connection method for terminal
CN104348809B (en) network security monitoring method and system
CN105100032B (en) A kind of method and device for preventing resource from stealing
US9058210B2 (en) Weighted request rate limiting for resources
CN104640114B (en) A kind of verification method and device of access request
US7908363B2 (en) Call limiter for web services
CN109246741B (en) Wireless network connection method for terminal
CN104253714B (en) Monitoring method, system, browser and server
CN104683459B (en) A kind of method and storage system for sending business datum
EP4120662A1 (en) Network communications
US10783562B2 (en) Mitigation of failures in an online advertising network
CN109510878A (en) A kind of long connection session keeping method and device
CN107249136A (en) Method for connecting network and device
US9600689B2 (en) Variable anonymous identifier value
CN106302099A (en) Conversation processing method in a kind of instant messaging and device
US9727873B1 (en) Digital returns
CN107959696A (en) A kind of daily record bill processing method and system
CN108881929B (en) Method and device for setting login prompt of live broadcast room
CN107819754A (en) A kind of anti-abduction method, monitoring server, terminal and system
CN107770162A (en) The method and device of brush present is prevented in a kind of live platform
CN111767558A (en) Data access monitoring method, device and system
CN105872634A (en) Video data sharing method and device
CN105871799A (en) Anti-stealing-link method and device
CN105554134A (en) Information synchronization and device
CN107666497B (en) Data access method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160817