CN105871799A - Anti-stealing-link method and device - Google Patents
Anti-stealing-link method and device Download PDFInfo
- Publication number
- CN105871799A CN105871799A CN201510850216.1A CN201510850216A CN105871799A CN 105871799 A CN105871799 A CN 105871799A CN 201510850216 A CN201510850216 A CN 201510850216A CN 105871799 A CN105871799 A CN 105871799A
- Authority
- CN
- China
- Prior art keywords
- authorisation device
- device mark
- data acquisition
- acquisition request
- request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/101—Access control lists [ACL]
Abstract
The embodiment of the invention provides an anti-stealing-link method and device, and relates to the technical field of the internet. The stealing-link problem of CDN (Content Delivery Network) service in the prior art is solved. The method provided by the embodiment of the invention comprises following steps of obtaining data obtaining requests sent by a client, wherein authorized device identifiers are carried in the data obtaining requests; counting request times of the authorized device identifiers in preset time; judging whether the request times reaches a times threshold value or not; and adding the authorized device identifiers to a blacklist if the judging result is yes. According to the embodiment of the method and the device, the CDN service is provided, and moreover, the anti-stealing-link purpose can be effectively carried out.
Description
Technical field
The present embodiments relate to Internet technical field, particularly relate to the method and device of a kind of door chain.
Background technology
Along with the development of Internet telephony, increasing people start to watch video frequency program on the net, but
Be user watch the fluency of online video and viewing quality also need to by the network bandwidth, network speed,
The impact of the network environments such as network traffics.Therefore, in order to improve the Consumer's Experience of viewing online video, just
Need the link avoiding likely affecting data transmission bauds and stability on the Internet, make data content pass
Defeated is the most more stable.
The manufacturer providing the user video content services at present on the market is the most, and for self-growth
Need all can develop the software player of oneself, user just can be watched by the software player of manufacturer
The video content services that manufacturer provides.Further, manufacturer, in order to attract user, can provide a user with more
The video content services that block is more stable, some of which provides the manufacturer of video content services can set up oneself
Content distributing network (Content Delivery Network, be called for short CDN) by the CDN system of oneself
System provides a user with video content services.CDN system can be real-time according to network traffics and each node
Connect, load state and the content that user sent to integrated informations such as the distance of user and response times
The request of acquisition is re-directed on the service node that user is nearest, so that user can obtain required nearby
The content wanted, solves the situation of network congestion, improves user and obtains the response speed of video content.
Owing to the technical research of CDN system is complicated and O&M cost is the highest, in the most much providing video
The manufacturer holding service cannot set up the CDN system of oneself.But some little manufacturer obtains to reduce self
The cost of video content and acquisition unlawful interests, it will usually simulation has the software player of CDN system
Behavior and to the other side CDN system send video acquisition request, gratuitously obtain from the CDN system of the other side
Take video content.Owing to CDN system is generally beyond recognition described request for general video acquisition request
It is whether the request that sends of one's own side's software player, usually there will be the manufacturer that video content services is provided
The situation of the stolen chain of CDN system occurs, and the most how to carry out effective while providing CDN service
Door chain becomes current problem demanding prompt solution.
Summary of the invention
The embodiment of the present invention provides the method and device of a kind of door chain, in order to solve CDN in prior art
The problem servicing stolen chain, it is achieved carry out the purpose of effective door chain while CDN service is provided.
According to first aspect of the embodiment of the present invention, the embodiment of the present invention provides a kind of method of door chain,
Including:
Obtain the data acquisition request that client sends, described data acquisition request carries authorisation device
Mark;
The request number of times of described authorisation device mark in statistics Preset Time;
Judge whether described request number of times reaches frequency threshold value;
If the determination result is YES, then limit in described authorisation device mark being piped off.
Further, the data acquisition request that described acquisition client sends, including:
Receive the data acquisition request that client sends;
Authorisation device mark is read from described data acquisition request.
Further, the request number of times of described authorisation device mark in described statistics Preset Time, including:
The authorisation device mark read from described data acquisition request is cached;
The request number of times of the described authorisation device mark of caching in statistics Preset Time.
Further, limit during described authorisation device mark is piped off, including:
Forbid that the data acquisition request to carrying described authorisation device mark responds.
Further, after limiting in described authorisation device mark is piped off, described side
Method also includes:
When in statistics Preset Time, the request number of times of described authorisation device mark is decreased below described number of times threshold
During value, by described authorisation device mark removal blacklist;
The data acquisition request that follow-up transmission is carried described authorisation device mark responds.
According to second aspect of the embodiment of the present invention, the embodiment of the present invention provides the device of a kind of door chain,
Including:
Acquiring unit, for obtaining the data acquisition request that client sends, in described data acquisition request
Carry authorisation device mark;
Statistic unit, the request number of times of described authorisation device mark in adding up Preset Time;
Judging unit, is used for judging whether described request number of times reaches frequency threshold value;
Processing unit, for when judged result is for being, identifies described authorisation device in piping off
Limit.
Further, described acquiring unit includes:
Receiver module, for receiving the data acquisition request that client sends;
Read module, for reading authorisation device mark from described data acquisition request.
Further, described statistic unit includes:
Cache module, for caching the authorisation device mark read from described data acquisition request;
Statistical module, the request number of times of the described authorisation device mark of caching in adding up Preset Time.
Further, described processing unit is for forbidding the data acquisition carrying described authorisation device mark
Request responds.
Further, described processing unit is additionally operable to when described authorisation device mark in statistics Preset Time
When request number of times is decreased below described frequency threshold value, described authorisation device mark is removed blacklist, with
And the data acquisition request that follow-up transmission is carried described authorisation device mark responds.
The method and device of the door chain that the embodiment of the present invention provides, it is possible to by obtaining what client sent
The authorisation device mark carried in data acquisition request, and described authorisation device mark in adding up Preset Time
Request number of times, if described request number of times reach set frequency threshold value, described authorisation device mark is described
Knowing and there is exception request, it is likely to stolen, thus needs to list described authorisation device mark in black name
List limits it and continues normal use.And in the prior art after authorisation device mark is stolen, arbitrarily
Third party's client can use this authorisation device labelling to send data acquisition request to CDN server,
Thus the phenomenon causing third party's client malice to obtain CDN content service occurs.Therefore with prior art
Present in the defect of the stolen chain of CDN service compare, the embodiment of the present invention can effectively control authorisation device
After mark loss, the risk of the stolen chain of CDN service, carries out effective door chain to CDN service.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to reality
Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that under,
Accompanying drawing during face describes is some embodiments of the present invention, for those of ordinary skill in the art,
On the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
The flow chart of the method for a kind of door chain that Fig. 1 provides for the embodiment of the present invention;
The schematic diagram of the authorisation device mark statistical result that Fig. 2 provides for the embodiment of the present invention;
The composition frame chart of the device of a kind of door chain that Fig. 3 provides for the embodiment of the present invention;
The composition frame chart of the device of the another kind of door chain that Fig. 4 provides for the embodiment of the present invention;
The entity structure schematic diagram of a kind of server that Fig. 5 provides for the embodiment of the present invention.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with this
Accompanying drawing in bright embodiment, is clearly and completely described the technical scheme in the embodiment of the present invention,
Obviously, described embodiment is a part of embodiment of the present invention rather than whole embodiments.Based on
Embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise
The every other embodiment obtained, broadly falls into the scope of protection of the invention.
There is the manufacturer of multiple offer video content services at present on the market, some of which manufacturer can set up certainly
Oneself content distributing network (Content Delivery Network is called for short CDN) by the CDN of oneself
System provides a user with video content services.There is the manufacturer of CDN in order to prevent other manufacturers by simulation
The behavior of self software player and to self CDN system send data acquisition request and gratuitously acquisition regard
Frequently content, it will usually add authorisation device mark in the data acquisition request that self software player sends,
Thus show that this request is to be sent by the software player of one's own side.But when described authorisation device mark is lost
After mistake, any third party's player can use described authorisation device mark to send to self CDN system
Data acquisition request thus malice obtains self data content.
In order to solve the problems referred to above, the embodiment of the present invention provides a kind of method of door chain, as it is shown in figure 1,
Described method includes:
101, obtain the data acquisition request that client sends, data acquisition request carries authorisation device
Mark.
In the prior art when user uses client to obtain data content, need by client to number
Data acquisition request is sent, according to the address information in described data acquisition request from phase according to content supplier
The server answered obtains the data content needed, and these contents are typically distributed on content distributing network CDN
In.Owing to CDN O&M cost is higher, therefore manufacturer is in order to prevent other clients from usurping self CDN
In data content, it will usually for self client distribute authorisation device mark, when own customers end to
CDN server can carry authorisation device mark in described request when sending data acquisition request, for table
Bright described data acquisition request is sent by one's own side's client, does not carries the data acquisition of authorisation device mark
Request cannot obtain data content from CDN.Therefore, the embodiment of the present invention when carrying out door chain first
Need to obtain the data acquisition request that client sends.
102, the request number of times of authorisation device mark in statistics Preset Time.
Although the data acquisition request that the client obtained in a step 101 sends carries authorisation device
Mark, but the situation stealing authorisation device mark owing to there is also third party's client occurs, the most also
Can not be completely secured and carry the data acquisition request of authorisation device mark must be the visitor of manufacturer belonging to CDN
Family end sends.If authorisation device mark is usurped by third party's client, then CDN server may obtain
Getting substantial amounts of malicious requests, therefore the embodiment of the present invention obtains, in step 101, the data that client sends
After obtaining request, step 102 to be performed adds up the request number of times of authorisation device mark in Preset Time.
103, judge whether request number of times reaches frequency threshold value.
Owing to normally obtaining in CDN during data content in client, the data that client sends obtain
Take the number of times of request be usually maintained in one normal in the range of, when the authorisation device of CDN server identifies
After being stolen, any third party's client can use the authorisation device stolen to identify to CDN server
Send data acquisition request, thus carry described mandate to what CDN server sent in causing a period of time
The quantity of the data acquisition request of device identification is increased sharply and is exceeded client and send data acquisition request number of times
Normal range.Therefore authorisation device mark in the embodiment of the present invention adds up Preset Time in a step 102
After request number of times, step 103 to be performed judges whether the request number of times that described authorisation device identifies reaches
To frequency threshold value.Described frequency threshold value is that client sends data acquisition request number of times in Preset Time
The maximum critical value of normal range.
104, if the determination result is YES, then limit in authorisation device mark being piped off.
When judging that the number of times carrying the data acquisition request of authorisation device mark reaches number of times in step 103
After threshold value, illustrating that described authorisation device mark is sending exception request, malice obtains the number in CDN
According to content.Therefore the embodiment of the present invention carries, described in being judged by step 103, the number that authorisation device identifies
According to obtain request number of times reach frequency threshold value after, need by described authorisation device mark pipe off from
And limit described authorisation device mark and normally use.
The method of the door chain that the embodiment of the present invention provides, it is possible to the data sent by obtaining client obtain
Take the authorisation device mark carried in request, and the request of described authorisation device mark in adding up Preset Time
Number of times, if described request number of times reaches the frequency threshold value set, illustrates that described authorisation device mark exists
Exception request, it is likely to stolen, thus the middle limit that needs to pipe off described authorisation device mark
Make it and continue normal use.And in the prior art after authorisation device mark is stolen, any third party
Client can use this authorisation device labelling to send data acquisition request to CDN server, thus makes
The phenomenon becoming third party's client malice to obtain CDN content service occurs.Therefore exist with prior art
The defect of the stolen chain of CDN service compare, the embodiment of the present invention can effectively control authorisation device mark and lose
After mistake, the risk of the stolen chain of CDN service, carries out effective door chain to CDN service.
In order to preferably understand the method shown in above-mentioned Fig. 1, the embodiment of the present invention will be in Fig. 1
Each step be described in detail.
In existing client after CDN server sends data acquisition request, CDN server only can
According to data acquisition request is carried for information about (such as address information, authorisation device identification information etc.)
The data content needed is returned to client, but owing to authorisation device mark there will be stolen situation,
Therefore prior art exists third party's client usurp authorisation device mark and malice from CDN server
Middle acquisition data content.In order to overcome drawbacks described above, embodiments provide a kind of embodiment,
Before the data acquisition request sent according to client obtains corresponding data content, need from data acquisition
Request is read its authorisation device carried mark.In actual process, in order to not to CDN service
The work of device interferes, and the embodiment of the present invention can control server, by frequency control by creating the frequency
Control server receives the data acquisition request that client sends, and reads from described data acquisition request and award
Power device identification.
Although the data acquisition request that client sends carries authorisation device mark, but can not protect
Demonstrate,proving described data acquisition request is to be sent by the client of manufacturer belonging to CDN server.Award described in if
Power device identification does not has stolen, then the number of times of the data acquisition request that the frequency controls server reception is usual
Can be in normal range;If described authorisation device mark is stolen, then arbitrarily third party's client meeting
Send substantial amounts of malicious requests, then the number of times that the frequency controls the data acquisition request that server receives is usual
Can increase sharply and exceed normal range.Therefore to determine that the data acquisition carrying described authorisation device mark please
Seeking Truth is no for malicious requests, and the embodiment of the present invention needs to add up the request number of times of authorisation device mark,
Judge whether it reaches the frequency threshold value set.Described frequency threshold value is typically on the basis of a large amount of statistics
The client obtained is normal (usually in the unit interval) in Preset Time sends data acquisition request number
The maximum critical value of amount.In order to add up the request number of times of authorisation device mark, embodiments provide
A kind of optional embodiment, is i.e. controlled server by from the data acquisition request received by the frequency created
The authorisation device mark of middle reading caches, and adds up authorisation device in Preset Time from buffered results
The request number of times of mark.Such as, if getting the number of times of authorisation device mark " le-1 " in Preset Time
Being 5 times, the number of times of authorisation device mark " le-2 " is 3 times, the number of times of authorisation device mark " le-3 "
It it is 20 times, then its statistical result can be preserved by form as shown in Figure 2.
When request number of times owing to identifying when a certain authorisation device in Preset Time reaches frequency threshold value, also
It is exactly to reach the normal maximum critical value sending data acquisition request quantity in Preset Time, awards described in explanation
There is exception request in power device identification, it is likely to stolen, it is therefore necessary to set described mandate
Standby mark limits.As the optional embodiment of one, the embodiment of the present invention is judging Preset Time
After the request number of times of interior a certain authorisation device mark reaches frequency threshold value, described authorisation device can be identified
Limit in piping off.Described blacklist is used for recording transmission dystropic authorisation device mark,
The authorisation device mark being in described blacklist will temporarily can not normally use, namely CDN server
The data acquisition request of the authorisation device mark carried in blacklist will not be responded.
Authorisation device mark owing to being in blacklist can't be utilized by third party's client always, because of
This carries the transmission times of the data acquisition request of authorisation device mark in blacklist also can tend to normal,
It is less than described number of times threshold when carrying the transmission times of the data acquisition request of authorisation device mark in blacklist
After value, in order to ensure that manufacturer's own customers end can normally use described authorisation device to identify, the present invention is real
Execute example and provide a kind of optional embodiment, i.e. when the request of authorisation device mark in statistics Preset Time
When number of times is decreased below described frequency threshold value, by described authorisation device mark removal blacklist, it is moved out of
The authorisation device mark of blacklist can continue to normally use, and follow-up transmission can be carried by CDN server
The data acquisition request of described authorisation device mark responds, thus ensures that client can take from CDN
Business device gets the data content of needs.Same, when follow-up again count on Preset Time in authorize and set
When the request number of times of standby mark reaches described frequency threshold value, in addition it is also necessary to described authorisation device mark is listed in black
In list.
The embodiment of the present invention is identified by dynamically management authorisation device, the mandate too much by sending request number of times
Device identification limits in piping off, and prevents having abnormal (stolen) sending request and awards
Power device identification malice obtains data content from CDN server, and when the authorisation device in blacklist
After the transmission request number of times of mark drops to normal range, the mark removal of normal authorisation device will be recovered black
List, and then ensure that manufacturer's own customers end can normally use described authorisation device to identify.
As to the application of method shown in above-mentioned Fig. 1, the embodiment of the present invention provides the device of a kind of door chain,
As it is shown on figure 3, described device includes: acquiring unit 31, statistic unit 32, judging unit 33 and
Processing unit 34, wherein,
Acquiring unit 31, for obtaining the data acquisition request that client sends, described data acquisition request
In carry authorisation device mark;
Statistic unit 32, the request number of times of described authorisation device mark in adding up Preset Time;
Judging unit 33, is used for judging whether described request number of times reaches frequency threshold value;
Processing unit 34, for when judged result is for being, pipes off described authorisation device mark
In limit.
Further, as shown in Figure 4, acquiring unit 31 includes:
Receiver module 311, for receiving the data acquisition request that client sends;
Read module 312, for reading authorisation device mark from described data acquisition request.
Further, statistic unit 32 includes:
Cache module 321, for carrying out the authorisation device mark read from described data acquisition request
Caching;
Statistical module 322, the request time of the described authorisation device mark of caching in adding up Preset Time
Number.
Further, processing unit 34 is for forbidding that the data acquisition to carrying described authorisation device mark please
Ask and respond.
Further, processing unit 34 is additionally operable to when asking that described authorisation device in statistics Preset Time identifies
When asking number of times to be decreased below described frequency threshold value, by described authorisation device mark removal blacklist, and
The data acquisition request that follow-up transmission is carried described authorisation device mark responds.
The device of the door chain that the embodiment of the present invention provides, it is possible to the data sent by obtaining client obtain
Take the authorisation device mark carried in request, and the request of described authorisation device mark in adding up Preset Time
Number of times, if described request number of times reaches the frequency threshold value set, illustrates that described authorisation device mark exists
Exception request, it is likely to stolen, thus the middle limit that needs to pipe off described authorisation device mark
Make it and continue normal use.And in the prior art after authorisation device mark is stolen, any third party
Client can use this authorisation device labelling to send data acquisition request to CDN server, thus makes
The phenomenon becoming third party's client malice to obtain CDN content service occurs.Therefore exist with prior art
The defect of the stolen chain of CDN service compare, the embodiment of the present invention can effectively control authorisation device mark and lose
After mistake, the risk of the stolen chain of CDN service, carries out effective door chain to CDN service.
Additionally, the device that the embodiment of the present invention provides is identified by dynamically management authorisation device, please by transmission
The authorisation device mark asking number of times too much limits in piping off, and prevents having abnormal transmission and asks
(stolen) authorisation device mark malice from CDN server, obtain data content, and when black
After the transmission request number of times of the authorisation device mark in list drops to normal range, recovery is awarded normally
Power device identification removal blacklist, and then ensure that manufacturer's own customers end can normally use described mandate to set
Standby mark.
For the device of above-mentioned door chain it should be noted that use in every embodiment of the present invention is each
The function of individual unit module can be passed through hardware processor (hardware processor) and realize.
Fig. 5 illustrates the entity structure schematic diagram of a kind of server, as it is shown in figure 5, this server is permissible
Including: processor (processor) 510, communication interface (Communications Interface) 520, storage
Device (memory) 530 and communication bus 540, wherein, processor 510, communication interface 520, memorizer
530 complete mutual communication by communication bus 540.Communication interface 520 may be used for service end with
Information transmission between client.Processor 510 can call the logical order in memorizer 530, with
Perform following method: terminal monitoring own power source state;When monitoring own power source state and changing,
Terminal sends state synchronization request to opposite end;Opposite end receives the state synchronization request that terminal sends;Opposite end will
The described state synchronization request received resolves;Opposite end is according to the parsing knot to described state synchronization request
Fruit adjusts the power supply status of self.
Additionally, the logical order in above-mentioned memorizer 530 can be real by the form of SFU software functional unit
Now and as independent production marketing or use time, a computer read/write memory medium can be stored in
In.Based on such understanding, prior art is contributed by technical scheme the most in other words
Part or the part of this technical scheme can embody with the form of software product, this computer is soft
Part product is stored in a storage medium, including some instructions with so that a computer equipment (can
To be personal computer, server, or the network equipment etc.) perform side described in each embodiment of the present invention
All or part of step of method.And aforesaid storage medium includes: USB flash disk, portable hard drive, read-only storage
Device (ROM, Read-Only Memory), random access memory (RAM, Random Access
Memory), the various medium that can store program code such as magnetic disc or CD.
Device embodiment described above is only schematically, wherein said illustrates as separating component
Unit can be or may not be physically separate, the parts shown as unit can be or
Person may not be physical location, i.e. may be located at a place, or can also be distributed to multiple network
On unit.Some or all of module therein can be selected according to the actual needs to realize the present embodiment
The purpose of scheme.Those of ordinary skill in the art are not in the case of paying performing creative labour, the most permissible
Understand and implement.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive each reality
The mode of executing can add the mode of required general hardware platform by software and realize, naturally it is also possible to by firmly
Part.Based on such understanding, the portion that prior art is contributed by technique scheme the most in other words
Dividing and can embody with the form of software product, this computer software product can be stored in computer can
Read in storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions with so that one
Computer equipment (can be personal computer, server, or the network equipment etc.) performs each to be implemented
The method described in some part of example or embodiment.
Last it is noted that above example is only in order to illustrate technical scheme, rather than to it
Limit;Although the present invention being described in detail with reference to previous embodiment, the ordinary skill of this area
Personnel it is understood that the technical scheme described in foregoing embodiments still can be modified by it, or
Person carries out equivalent to wherein portion of techniques feature;And these amendments or replacement, do not make corresponding skill
The essence of art scheme departs from the spirit and scope of various embodiments of the present invention technical scheme.
Claims (10)
1. the method for a door chain, it is characterised in that described method includes:
Obtain the data acquisition request that client sends, described data acquisition request carries authorisation device
Mark;
The request number of times of described authorisation device mark in statistics Preset Time;
Judge whether described request number of times reaches frequency threshold value;
If the determination result is YES, then limit in described authorisation device mark being piped off.
Method the most according to claim 1, it is characterised in that the number that described acquisition client sends
According to obtaining request, including:
Receive the data acquisition request that client sends;
Authorisation device mark is read from described data acquisition request.
Method the most according to claim 2, it is characterised in that described in described statistics Preset Time
The request number of times of authorisation device mark, including:
The authorisation device mark read from described data acquisition request is cached;
The request number of times of the described authorisation device mark of caching in statistics Preset Time.
Method the most according to claim 1, it is characterised in that described authorisation device mark is listed in
Blacklist limits, including:
Forbid that the data acquisition request to carrying described authorisation device mark responds.
Method the most according to any one of claim 1 to 4, it is characterised in that awarding described
After power device identification limits in piping off, described method also includes:
When in statistics Preset Time, the request number of times of described authorisation device mark is decreased below described number of times threshold
During value, by described authorisation device mark removal blacklist;
The data acquisition request that follow-up transmission is carried described authorisation device mark responds.
6. the device of a door chain, it is characterised in that described device includes:
Acquiring unit, for obtaining the data acquisition request that client sends, in described data acquisition request
Carry authorisation device mark;
Statistic unit, the request number of times of described authorisation device mark in adding up Preset Time;
Judging unit, is used for judging whether described request number of times reaches frequency threshold value;
Processing unit, for when judged result is for being, identifies described authorisation device in piping off
Limit.
Device the most according to claim 6, it is characterised in that described acquiring unit includes:
Receiver module, for receiving the data acquisition request that client sends;
Read module, for reading authorisation device mark from described data acquisition request.
Device the most according to claim 7, it is characterised in that described statistic unit includes:
Cache module, for caching the authorisation device mark read from described data acquisition request;
Statistical module, the request number of times of the described authorisation device mark of caching in adding up Preset Time.
Device the most according to claim 6, it is characterised in that it is right that described processing unit is used for forbidding
The data acquisition request carrying described authorisation device mark responds.
10. according to the device according to any one of claim 6 to 9, it is characterised in that described process
Unit is additionally operable to when in statistics Preset Time, the request number of times of described authorisation device mark is decreased below described
During frequency threshold value, by described authorisation device mark removal blacklist, and follow-up transmission is carried described
The data acquisition request of authorisation device mark responds.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510850216.1A CN105871799A (en) | 2015-11-27 | 2015-11-27 | Anti-stealing-link method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510850216.1A CN105871799A (en) | 2015-11-27 | 2015-11-27 | Anti-stealing-link method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105871799A true CN105871799A (en) | 2016-08-17 |
Family
ID=56623792
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510850216.1A Pending CN105871799A (en) | 2015-11-27 | 2015-11-27 | Anti-stealing-link method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105871799A (en) |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859149A (en) * | 2005-08-02 | 2006-11-08 | 华为技术有限公司 | Method for realizing stream medium business service |
CN103986735A (en) * | 2014-06-05 | 2014-08-13 | 北京赛维安讯科技发展有限公司 | CDN (content distribution network) antitheft system and antitheft method |
-
2015
- 2015-11-27 CN CN201510850216.1A patent/CN105871799A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1859149A (en) * | 2005-08-02 | 2006-11-08 | 华为技术有限公司 | Method for realizing stream medium business service |
CN103986735A (en) * | 2014-06-05 | 2014-08-13 | 北京赛维安讯科技发展有限公司 | CDN (content distribution network) antitheft system and antitheft method |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109152095B (en) | Wireless network connection method for terminal | |
CN104348809B (en) | network security monitoring method and system | |
CN105100032B (en) | A kind of method and device for preventing resource from stealing | |
US9058210B2 (en) | Weighted request rate limiting for resources | |
CN104640114B (en) | A kind of verification method and device of access request | |
US7908363B2 (en) | Call limiter for web services | |
CN109246741B (en) | Wireless network connection method for terminal | |
CN104253714B (en) | Monitoring method, system, browser and server | |
CN104683459B (en) | A kind of method and storage system for sending business datum | |
EP4120662A1 (en) | Network communications | |
US10783562B2 (en) | Mitigation of failures in an online advertising network | |
CN109510878A (en) | A kind of long connection session keeping method and device | |
CN107249136A (en) | Method for connecting network and device | |
US9600689B2 (en) | Variable anonymous identifier value | |
CN106302099A (en) | Conversation processing method in a kind of instant messaging and device | |
US9727873B1 (en) | Digital returns | |
CN107959696A (en) | A kind of daily record bill processing method and system | |
CN108881929B (en) | Method and device for setting login prompt of live broadcast room | |
CN107819754A (en) | A kind of anti-abduction method, monitoring server, terminal and system | |
CN107770162A (en) | The method and device of brush present is prevented in a kind of live platform | |
CN111767558A (en) | Data access monitoring method, device and system | |
CN105872634A (en) | Video data sharing method and device | |
CN105871799A (en) | Anti-stealing-link method and device | |
CN105554134A (en) | Information synchronization and device | |
CN107666497B (en) | Data access method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160817 |