CN105915494A - Anti-stealing-link method and system - Google Patents

Anti-stealing-link method and system Download PDF

Info

Publication number
CN105915494A
CN105915494A CN201510890714.9A CN201510890714A CN105915494A CN 105915494 A CN105915494 A CN 105915494A CN 201510890714 A CN201510890714 A CN 201510890714A CN 105915494 A CN105915494 A CN 105915494A
Authority
CN
China
Prior art keywords
user
signature
parameters
key
playing request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510890714.9A
Other languages
Chinese (zh)
Inventor
金宗锐
王栋浩
刘钧石
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
LeCloud Computing Co Ltd
LeTV Cloud Computing Co Ltd
Original Assignee
LeTV Cloud Computing Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by LeTV Cloud Computing Co Ltd filed Critical LeTV Cloud Computing Co Ltd
Priority to CN201510890714.9A priority Critical patent/CN105915494A/en
Publication of CN105915494A publication Critical patent/CN105915494A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/23Processing of content or additional data; Elementary server operations; Server middleware
    • H04N21/234Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
    • H04N21/2347Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/266Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
    • H04N21/26606Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/60Network streaming of media packets
    • H04L65/75Media network packet handling
    • H04L65/764Media network packet handling at the destination 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]

Abstract

The invention provides an anti-stealing-link method comprising the steps that a playing request of a user is received, and playing request parameters are acquired, wherein the playing request parameters include a user signature and other parameters, and other parameters at least include a user ID; a secret key corresponding to the user ID is determined according to the user ID of the playing request of the user; a verification signature is generated based on other parameters and the secret key; and the user signature and the verification signature are compared, and the playing request of the user is refused when the user signature and the verification signature are not matched. The invention also provides an anti-stealing-link system so that the possibility of link stealing can be reduced, stealing prevention is enabled to be more thorough, and the workload of the stealing prevention process can also be reduced.

Description

Anti-stealing link method and system
Technical field
The present embodiments relate to internet security technical field, particularly relate to a kind of anti-stealing link method and be System.
Background technology
Along with Internet technology and the fast development of multimedia technology, substantial amounts of safety problem is arisen at the historic moment, Stealing chain is exactly one side therein.Steal chain and refer to that service provider oneself does not provide the content of service, pass through Technological means walks around other gainful end-user interface (such as advertisement), directly on the website of oneself There is provided the service content of other service provider to end user, section end user browses and clicking rate.
Such as, in actual application, some illegal businessmans can pass through correlation technique (such as web crawlers technology) Crawl URL address (the Uniform Resource of the files in stream media that multimedia service provider provides Locator, URL), the sky of oneself will be put into after some coding changes inside URL address In between, when user wants to watch this video, just can directly play after just clicking directly on this link, And real service provider does not knows the most stolen chain of resource of oneself, provide to real service Business causes huge economic loss.
Stealing during chain, beneficiary does not provide resource or provides little resource, and real clothes Business provider but can not get any income, and still suffers from a series of danger brought because of stolen chain Evil, such as: chain is stolen in website can consume the bandwidth of stolen chain website in a large number, causes the access speed of stolen chain website Spending slack-off, real clicking rate perhaps can be the least, and if existing the most such in a station server Stealing chain situation, the speed of server will decline, and network card pauses, and brings bad experience to user, also Seriously compromise the interests of stolen chain website, if more serious chain website of stealing also has pornographic, reaction content, More the fame of stolen chain website can be caused and have a strong impact on.Therefore the Internet especially wireless Internet safety Field, steals chain security protection imperative.
Existing door chain scheme can be divided into the most several by principle:
1) filename or file directory are irregularly changed
This anti-stealing link method is, title or address by random change resource file realize antitheft The function of chain.The method advantage is simple, and shortcoming is that workload is very big, and may affect use The normal download at family.
2) referer is limited
The principle of this door chain is, limits according to the HTTP_REFERER field of HTTP request It it is whether the request initiated of trusted sources.Or can realize in conjunction with overwrite function such as .htaccess Further door chain function.
The method breaks through difficulty compared to the first and wants big.Shortcoming be then to access every time be required for behaviour Make .htaccess file performance is had an impact, open overwrite function in service end simultaneously and have Limit, and user can break through restriction by the way of camouflage HTTP_REFERER.
3) encryption certification
This door chain mode, first obtains user profile from client, then according to specific rule User profile is formed encrypted characters string as authentication information, pass to backstage anti-stealing link system and carry out Authentication.Only being proved to be successful, user passed to by the file that service end just can need user, but this The mode of kind is easily cracked so that door chain is the most thorough.
4) file camouflage
This anti-stealing link method needs the function of service end to be coordinated, and principle needs request as user exactly The when of corresponding resource, service end can to sess ion or cookie of user or HTTP_REFERER carries out school inspection.
The method is owing to will not expose the true address of file, and can verify the identity of user, Therefore door chain effect is fine.But this service judges, therefore owing to user profile is done some by needs Efficiency can be affected, and is not suitable for this service scenarios of video request program.
Summary of the invention
In order to reduce in door chain workload and solve reference address and be easily forged and encrypted characters string holds The halfway situation of door chain being easily cracked and cause, on the one hand, the embodiment of the present invention provides one anti- Steal chain method, including:
Receiving the playing request of user, obtain playing request parameter, described playing request parameter includes user Signature and other parameters, other parameters described at least include ID;
The ID in playing request according to described user, determines the key corresponding with described ID;
Signature verification is generated based on other parameters described and described key;
Relatively described user's signature and described signature verification, when described user's signature with described signature verification not During coupling, the playing request of refusal user.
The embodiment of the present invention provides a kind of anti-stealing link system, including:
Receiver module, for receiving the playing request of user, obtains playing request parameter, and described broadcasting please Asking parameter to include user's signature and other parameters, other parameters described at least include ID;
Key determines module, for according to the ID in the playing request of described user, determines with described The key that ID is corresponding;
Signature verification generation module, for generating signature verification based on other parameters described and described key;
Signature comparison module, for relatively described user's signature and described signature verification;
Playing request processing module, for when described user's signature does not mates with described signature verification, refuses The playing request of user absolutely.
The anti-stealing link method of embodiment of the present invention offer and system, by the playing request to reception user, Obtaining playing request parameter, described playing request parameter includes user's signature and other parameters, described other Parameter at least includes ID;The ID in playing request according to described user, determines and described use The key that family ID is corresponding;Signature verification is generated based on other parameters described and described key;Relatively described use Family signature and described signature verification, when described user's signature does not mates with described signature verification, refusal is used The mode of the playing request at family carries out the antitheft possibility decreasing stolen chain so that antitheft more thorough, Also mitigate simultaneously antitheft during workload.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below The required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is this Some bright embodiments, for those of ordinary skill in the art, before not paying creative work Put, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of the anti-stealing link method of one embodiment of the invention;
Fig. 2 is the flow chart of the anti-stealing link method of another embodiment of the present invention;
Fig. 3 is the schematic diagram of the anti-stealing link system of one embodiment of the invention.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with this Accompanying drawing in bright embodiment, is clearly and completely described the technical scheme in the embodiment of the present invention, Obviously, described embodiment is a part of embodiment of the present invention rather than whole embodiments.Based on Embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise The every other embodiment obtained, broadly falls into the scope of protection of the invention.
It should be noted that in the case of not conflicting, in embodiment in the application and embodiment Involved technical characteristic can be mutually combined each other.
It is right that the present invention can be applicable in various video website (as happy regarded, excellent cruel, PPTV, the strange skill of love etc.) Under the program request of video, the various scenes such as live.
The embodiment of the present invention can be passed through hardware processor (hardware processor) and realize phase Close functional module.
Fig. 1 is the schematic flow sheet of anti-stealing link method embodiment of the present invention.As it is shown in figure 1, the present invention prevents Steal chain method to include:
Step 101: receive the playing request of user, obtains playing request parameter, and described playing request is joined Number includes user's signature and other parameters, and other parameters described at least include ID;
Step 102: according to the ID in the playing request of described user, determines and described ID pair The key answered;
Step 103: generate signature verification based on other parameters described and described key;
Step 104: relatively described user's signature and described signature verification, when described user's signature is with described When signature verification is not mated, the playing request of refusal user.
As in figure 2 it is shown, the anti-stealing link method of another embodiment, including:
Step 201: receive the playing request of user, obtains playing request parameter, and described playing request is joined Number includes user's signature and other parameters, and other parameters described at least include ID and request time stamp;
Step 202: according to the ID in the playing request of described user, determines and described ID pair The key answered;
Step 203: generate signature verification based on other parameters described and described key;
Step 204: relatively described user's signature and described signature verification;
Step 205: when described user's signature does not mates with described signature verification, the broadcasting of refusal user Request.
Step 206: when described signature mates with described signature verification, when determining whether described request Between stab whether be positioned at predetermined effective duration, when described timestamp exceedes described predetermined effective duration, refuse The playing request of user absolutely.
When above-mentioned signature verification is passed through, it is believed that request time stamp information is believable, and then could be right Request time stamp is verified.
Whether server is positioned at predetermined effective duration according to request time stamp, enters the use authority of user Row verification, verify by time, just understand send stream medium data to user.
Whether server is positioned at predetermined effective duration according to request time stamp, during by judging described request Between stamp exceed described predetermined effective duration and carry out real-time authorized user and use the time of resource, thus preferably Ensure that the safe handling of resource, be more conducive to the use to resource and control and management.
Above-mentioned steps " generates signature verification based on other parameters described and described key " and including:
Based on other parameters described, control parameters/key/value table, determine the key corresponding with other parameters described/ Value ordered series of numbers, sorts described key/value ordered series of numbers according to predefined procedure and is spliced to form the first character string;
After described character string, splice described key generate the second character string;
Calculate the md5 value of described second character string;
Described md5 value is converted to 16 system character strings, generates signature verification.
In order to make server end mate with client, thus carry out the data between server end and client Linking up, above-mentioned predefined procedure is the ascending order for key.
Above-mentioned first character string is by gpc (get player config obtains video playback configuration information) After other parameters in the playing request of user are arranged by system according to the ascending order order of key, by key Value and value value are linked in sequence composition.Leave in after character string assembly in gpc system.
Other parameters described in above-described embodiment the most also include calling api interface title, interface version. According to the difference of other parameters in different playing request, such as, access ID, timestamp, API connect Mouth title, the difference of interface version, it is possible to accomplish each with having independent character string information per family, should Character string is difficult to imitated, if after stealing character string described in any falsification of chain person, just cannot pass through checking, Accordingly will denied access service.
Certainly, in the middle of actual application, other parameters above-mentioned are for accessing ID, timestamp, API Interface name, interface version but be not restricted to access ID, timestamp, api interface title, Interface version, other parameters in described playing request are according to user's program request or live concrete condition Fixed, such as, other parameters can also be the activity name of user live broadcast or program request, live or program request Time started, the end time, live or program request stream code check type (such as smoothness, SD, high definition, Super clear, original painting), the activity watched of play mode (real-time live broadcast, delay live) and user Type (news conference, wedding, annual meeting, physical culture, finance and economics, game, interview) etc..
Above-mentioned with playing request in parameter/key/value table corresponding to other parameters be according to historic user Live or program request request situation preset, and this form is stored in data base, to be used Time recalled the playing request parameter comparison with user, determine the key corresponding with parameter and key institute Corresponding value.Meanwhile, this known parameter/key/value table can also regularly or be carried out as required Update, improve the degree of accuracy of form.Such as, up-to-date go out a TV play or film, the most just Want adaptive and to be correlated with this TV play or the title of film at described parameter/key/value table Some parameters add in described parameter/key/value table, to ensure that following operation does not haves mistake By mistake.
In real life, the life stress of people is very big, particularly Beijing, Shanghai, Guangzhou, Shenzhen Working clan, rhythm of life is increasingly faster, works increasing, and the pressure lived and work is the most more and more Greatly, in order to alleviate pressure, people would generally utilize the free time on Sunday on Saturday from video website (example As excellent cruel, happy depending on, PPTV, MPC etc.) in search the highest films viewing of some scorings entertain from Oneself, loosen mood, but point often find after opening that these the highest films of marking are usually member's film, Needing to pay and could watch, need not pay again to meet the wish oneself seen a film, people can be the most sharp By the resource of the Internet, browse various website, to expect to watch these films, the most illegal business The viewing address that video website will be stolen to get some advantage from it by family is supplied to user, thus causes video net The resource stood is stolen and the bandwidth consumption of stolen website is serious, and network speed declines, in order to effectively hit Illegal businessman, safeguards the interests of video website, at this moment can by receive ID, api interface title, Interface version, request time stamp, user watch class belonging to film title, program request film duration and film Type (such as horror film, comedy, romance movie, acrobatic fighting film) etc., and according to the ID of user determine with The key that described ID is corresponding, then generates signature verification according to above-mentioned parameter and key, if described use When family signature does not mates with described signature verification, then the mode of the playing request refusing user reaches to prevent Steal the effect of chain, safeguard the interests of video website.
Further improvement is that of anti-stealing link method in above-described embodiment, when signature verification is passed through, permissible Know that request time stamp information is genuine and believable, in order to reach more effectively door chain, to enter further Row judges whether described request time stamp is positioned at predetermined effective duration, when described timestamp exceedes described pre- During fixed effective duration, the playing request of refusal user.Thus carry out real-time authorized user and use resource Time, thus better assure that the safe handling of resource, it is more conducive to the use to resource and controls and pipe Reason.
The present invention does not interferes with the link that visitor is asked, and nor affects on web site traffic logic, it is ensured that Convenience, easily using effect;By the signature verification in access request, character string are verified with in time Between stab Information Authentication multiple safety, the possibility of its stolen chain has been dramatically reduced, has solved from principle Multiple visitors use same agency to conduct interviews website, and visitor IP is identical and causes cannot be distinguished by Problem.The feasibility of the present invention is high, and most of websites can be realized by simple techniques such as filters, no Can business original to website impact.
The anti-stealing link method that the embodiment of the present invention provides, by the playing request to reception user, acquisition is broadcast Putting required parameter, described playing request parameter includes user's signature and other parameters, and other parameters described are extremely Include ID less;The ID in playing request according to described user, determines and described ID Corresponding key;Signature verification is generated based on other parameters described and described key;When described user's signature When not mating with described signature verification, the mode of playing request of refusal user carry out antitheft decrease stolen The possibility of chain so that antitheft more thorough, also mitigate simultaneously antitheft during workload.
Fig. 3 is the structural representation of anti-stealing link system embodiment of the present invention.As it is shown on figure 3, the present invention prevents Robber's catenary system includes:
Receiver module, for receiving the playing request of user, obtains playing request parameter, and described broadcasting please Asking parameter to include user's signature and other parameters, other parameters described at least include ID;
Key determines module, for according to the ID in the playing request of described user, determines with described The key that ID is corresponding;
Signature verification generation module, for generating signature verification based on other parameters described and described key;
Signature comparison module, for relatively described user's signature and described signature verification;
Playing request processing module, for when described user's signature does not mates with described signature verification, refuses The playing request of user absolutely.
The anti-stealing link system of another embodiment of the present invention includes:
Receiver module, for receiving the playing request of user, obtains playing request parameter, and described broadcasting please Asking parameter to include user's signature and other parameters, other parameters described at least include ID and request time Stamp;
Key determines module, for according to the ID in the playing request of described user, determines with described The key that ID is corresponding;
Signature verification generation module, for generating signature verification based on other parameters described and described key;
Signature comparison module, for relatively described signature and described signature verification;
Timeliness judge module, for when described signature mates with described signature verification, determines whether institute State whether request time stamp is positioned at predetermined effective duration;
Playing request processing module, for when described user's signature does not mates with described signature verification, refuses The playing request of user absolutely, when described timestamp exceedes described predetermined effective duration, refusal user broadcasts Put request.
Above-mentioned verification generation module includes:
First text string generation unit, for based on other parameters described, control parameters/key/value table, really The fixed key/value ordered series of numbers corresponding with other parameters described, sorts described key/value ordered series of numbers according to predefined procedure and spells Connect formation the first character string;
Second text string generation unit, generates the second character for splicing described key after described character string String;
Md5 computing unit, for calculating the md5 value of described second character string;
Signature verification signal generating unit, for described md5 value is converted to 16 system character strings, generates school Sign test name.
In above-mentioned first text string generation unit, described predefined procedure is the ascending order for key.
Other parameters described in above-mentioned receiver module the most also include calling api interface title, interface Version.
The anti-stealing link system that the embodiment of the present invention provides, by receiver module, key production module, school Test signature generation module, signature comparison module and playing request processing module and carry out straight at user video Broadcast or door chain in on-demand process, decrease the possibility of stolen chain so that be antitheft more thorough, Also mitigate simultaneously antitheft during workload.
Device embodiment described above is only schematically, wherein said illustrates as separating component Unit can be or may not be physically separate, the parts shown as unit can be or Person may not be physical location, i.e. may be located at a place, or can also be distributed to multiple network On unit.Some or all of module therein can be selected according to the actual needs to realize the present embodiment The purpose of scheme.Those of ordinary skill in the art are not in the case of paying performing creative labour, the most permissible Understand and implement.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive each reality The mode of executing can add the mode of required general hardware platform by software and realize, naturally it is also possible to by firmly Part.Based on such understanding, the portion that prior art is contributed by technique scheme the most in other words Dividing and can embody with the form of software product, this computer software product can be stored in computer can Read in storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions with so that one Computer equipment (can be personal computer, server, or the network equipment etc.) performs each to be implemented The method described in some part of example or embodiment.
Last it is noted that above example is only in order to illustrate technical scheme, rather than to it Limit;Although the present invention being described in detail with reference to previous embodiment, the ordinary skill of this area Personnel it is understood that the technical scheme described in foregoing embodiments still can be modified by it, or Person carries out equivalent to wherein portion of techniques feature;And these amendments or replacement, do not make corresponding skill The essence of art scheme departs from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (10)

1. an anti-stealing link method, it is characterised in that including:
Receiving the playing request of user, obtain playing request parameter, described playing request parameter includes user Signature and other parameters, other parameters described at least include ID;
The ID in playing request according to described user, determines the key corresponding with described ID;
Signature verification is generated based on other parameters described and described key;
Relatively described user's signature and described signature verification, when described user's signature with described signature verification not During coupling, the playing request of refusal user.
Method the most according to claim 1, it is characterised in that when other parameters described include request Between stab,
When described signature mates with described signature verification, determine whether that described request time stabs whether position In predetermined effective duration,
When described timestamp exceedes described predetermined effective duration, the playing request of refusal user.
Method the most according to claim 1, it is characterised in that described based on other parameters described and Described key generates signature verification and includes:
Based on other parameters described, control parameters/key/value table, determine the key corresponding with other parameters described/ Value ordered series of numbers, sorts described key/value ordered series of numbers according to predefined procedure and is spliced to form the first character string;
After described character string, splice described key generate the second character string;
Calculate the md5 value of described second character string;
Described md5 value is converted to 16 system character strings, generates signature verification.
Method the most according to claim 3, it is characterised in that described predefined procedure is for key Ascending order.
5. according to the method according to any one of claim 1-4, it is characterised in that other parameters described Also include calling api interface title, interface version.
6. an anti-stealing link system, including:
Receiver module, for receiving the playing request of user, obtains playing request parameter, and described broadcasting please Asking parameter to include user's signature and other parameters, other parameters described at least include ID;
Key determines module, for according to the ID in the playing request of described user, determines with described The key that ID is corresponding;
Signature verification generation module, for generating signature verification based on other parameters described and described key;
Signature comparison module, for relatively described user's signature and described signature verification;
Playing request processing module, for when described user's signature does not mates with described signature verification, refuses The playing request of user absolutely.
System the most according to claim 6, it is characterised in that when other parameters described include request Between stab, described system also includes timeliness judge module, for determining described label when described signature comparison module Name is when mating with described signature verification, determine whether described request time stab whether be positioned at predetermined effective time In long;
Described playing request processing module, for when described signature mates with described signature verification but described asks When seeking time stamp exceedes described predetermined effective duration, the playing request of refusal user.
System the most according to claim 6, it is characterised in that described signature verification generation module bag Include:
First text string generation unit, for based on other parameters described, control parameters/key/value table, determines The key/value ordered series of numbers corresponding with other parameters described, sorts described key/value ordered series of numbers according to predefined procedure and splices Form the first character string;
Second text string generation unit, generates the second character for splicing described key after described character string String;
Md5 computing unit, for calculating the md5 value of described second character string;
Signature verification signal generating unit, for described md5 value is converted to 16 system character strings, generates school Sign test name.
System the most according to claim 8, it is characterised in that described predefined procedure is for key Ascending order.
10. according to the system described in claim 6-9, it is characterised in that other parameters described also include Call api interface title, interface version.
CN201510890714.9A 2015-12-07 2015-12-07 Anti-stealing-link method and system Pending CN105915494A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510890714.9A CN105915494A (en) 2015-12-07 2015-12-07 Anti-stealing-link method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510890714.9A CN105915494A (en) 2015-12-07 2015-12-07 Anti-stealing-link method and system

Publications (1)

Publication Number Publication Date
CN105915494A true CN105915494A (en) 2016-08-31

Family

ID=56744101

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510890714.9A Pending CN105915494A (en) 2015-12-07 2015-12-07 Anti-stealing-link method and system

Country Status (1)

Country Link
CN (1) CN105915494A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485539A (en) * 2016-09-18 2017-03-08 百川通联(北京)网络技术有限公司 A kind of method and system preventing advertisement cheating
CN107809672A (en) * 2017-10-10 2018-03-16 武汉斗鱼网络科技有限公司 Detect method, storage medium, equipment and the system of the secondary packing of application installation package
CN108322449A (en) * 2018-01-09 2018-07-24 武汉斗鱼网络科技有限公司 A kind of method, storage medium, equipment and system for preventing video flowing stolen
WO2018176531A1 (en) * 2017-03-31 2018-10-04 武汉斗鱼网络科技有限公司 Video request and video playing method and apparatus
CN109413000A (en) * 2017-08-15 2019-03-01 吴波 A kind of anti-stealing link method and door chain gateway system
CN110034922A (en) * 2019-04-22 2019-07-19 湖南快乐阳光互动娱乐传媒有限公司 Request processing method, processing unit and requests verification method, verifying device
CN110138716A (en) * 2018-02-09 2019-08-16 网宿科技股份有限公司 A kind of offer of key, video broadcasting method, server and client
CN110413110A (en) * 2019-07-05 2019-11-05 深圳市工匠社科技有限公司 The control method and Related product of virtual role
CN110519609A (en) * 2019-07-23 2019-11-29 广州易方信息科技股份有限公司 A method of illegal bootlegging broadcasting when monitoring live streaming
CN114286134A (en) * 2021-12-23 2022-04-05 天翼视讯传媒有限公司 Method and system for identifying play hotlinking behavior applied to interface request
CN115001710A (en) * 2022-06-01 2022-09-02 山东福生佳信科技股份有限公司 Video playing request management method based on signature parameter updating

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036924A (en) * 2011-09-29 2013-04-10 深圳市快播科技有限公司 Chaining processing method and chaining processing system
CN103986735A (en) * 2014-06-05 2014-08-13 北京赛维安讯科技发展有限公司 CDN (content distribution network) antitheft system and antitheft method

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103036924A (en) * 2011-09-29 2013-04-10 深圳市快播科技有限公司 Chaining processing method and chaining processing system
CN103986735A (en) * 2014-06-05 2014-08-13 北京赛维安讯科技发展有限公司 CDN (content distribution network) antitheft system and antitheft method

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106485539A (en) * 2016-09-18 2017-03-08 百川通联(北京)网络技术有限公司 A kind of method and system preventing advertisement cheating
CN106485539B (en) * 2016-09-18 2019-08-06 北京联动优创文化传媒有限公司 A kind of method and system for preventing advertisement from practising fraud
WO2018176531A1 (en) * 2017-03-31 2018-10-04 武汉斗鱼网络科技有限公司 Video request and video playing method and apparatus
CN109413000A (en) * 2017-08-15 2019-03-01 吴波 A kind of anti-stealing link method and door chain gateway system
CN109413000B (en) * 2017-08-15 2021-06-18 刘其星 Anti-stealing-link method and anti-stealing-link network relation system
CN107809672A (en) * 2017-10-10 2018-03-16 武汉斗鱼网络科技有限公司 Detect method, storage medium, equipment and the system of the secondary packing of application installation package
CN108322449A (en) * 2018-01-09 2018-07-24 武汉斗鱼网络科技有限公司 A kind of method, storage medium, equipment and system for preventing video flowing stolen
CN110138716A (en) * 2018-02-09 2019-08-16 网宿科技股份有限公司 A kind of offer of key, video broadcasting method, server and client
US11055429B2 (en) 2018-02-09 2021-07-06 Wangsu Science & Technology Co., Ltd. Key providing method, video playing method, server and client
CN110034922A (en) * 2019-04-22 2019-07-19 湖南快乐阳光互动娱乐传媒有限公司 Request processing method, processing unit and requests verification method, verifying device
CN110413110A (en) * 2019-07-05 2019-11-05 深圳市工匠社科技有限公司 The control method and Related product of virtual role
CN110519609A (en) * 2019-07-23 2019-11-29 广州易方信息科技股份有限公司 A method of illegal bootlegging broadcasting when monitoring live streaming
CN114286134A (en) * 2021-12-23 2022-04-05 天翼视讯传媒有限公司 Method and system for identifying play hotlinking behavior applied to interface request
CN114286134B (en) * 2021-12-23 2024-02-27 天翼视讯传媒有限公司 Method and system for identifying and playing hotlinking behavior in interface request
CN115001710A (en) * 2022-06-01 2022-09-02 山东福生佳信科技股份有限公司 Video playing request management method based on signature parameter updating

Similar Documents

Publication Publication Date Title
CN105915494A (en) Anti-stealing-link method and system
US11658979B2 (en) Systems and methods for efficient and secure temporary anonymous access to media content
US8601586B1 (en) Method and system for detecting web application vulnerabilities
CN103957436B (en) A kind of video anti-stealing link method based on OTT business
US8307099B1 (en) Identifying use of software applications
WO2016184216A1 (en) Link-stealing prevention method, link-stealing prevention server, and client side
CN104869102B (en) Authorization method, device and system based on xAuth agreement
US20110029555A1 (en) Method, system and apparatus for content identification
CN107911282B (en) Network system for realizing implantation of third-party application facing social network
US10523986B2 (en) Methods for identifying, disrupting and monetizing the illegal sharing and viewing of digital and analog streaming content
CN109413000B (en) Anti-stealing-link method and anti-stealing-link network relation system
CN105357190A (en) Method and system for performing authentication on access request
US20210218776A1 (en) Network policy service for dynamic media
CN108683631B (en) Method and system for preventing scanning of authority file
CN1953452B (en) A method for dynamic certification and authorization for stream media
CN115242546A (en) Industrial control system access control method based on zero trust architecture
US8386775B2 (en) Tolerant key verification method
TWI640194B (en) Content delivery network audio and video service anti-theft connection method
CN106888200B (en) Identification association method, information sending method and device
CN105847262A (en) Anti-stealing-link method and system
Ghiani et al. Security in migratory interactive web applications
CN110381375A (en) A kind of determining method, client and server for stealing brush data
Hu et al. Measurement of the usage of web clips in underground economy
KR100510908B1 (en) A security method of streaming service with media player
CN108234383A (en) Information access method and secure access service device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20160831

WD01 Invention patent application deemed withdrawn after publication