CN105915494A - Anti-stealing-link method and system - Google Patents
Anti-stealing-link method and system Download PDFInfo
- Publication number
- CN105915494A CN105915494A CN201510890714.9A CN201510890714A CN105915494A CN 105915494 A CN105915494 A CN 105915494A CN 201510890714 A CN201510890714 A CN 201510890714A CN 105915494 A CN105915494 A CN 105915494A
- Authority
- CN
- China
- Prior art keywords
- user
- signature
- parameters
- key
- playing request
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
- H04L63/1458—Denial of Service
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/23—Processing of content or additional data; Elementary server operations; Server middleware
- H04N21/234—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs
- H04N21/2347—Processing of video elementary streams, e.g. splicing of video streams, manipulating MPEG-4 scene graphs involving video stream encryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/25—Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
- H04N21/266—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel
- H04N21/26606—Channel or content management, e.g. generation and management of keys and entitlement messages in a conditional access system, merging a VOD unicast channel into a multicast channel for generating or managing entitlement messages, e.g. Entitlement Control Message [ECM] or Entitlement Management Message [EMM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L65/00—Network arrangements, protocols or services for supporting real-time applications in data packet communication
- H04L65/60—Network streaming of media packets
- H04L65/75—Media network packet handling
- H04L65/764—Media network packet handling at the destination
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Abstract
The invention provides an anti-stealing-link method comprising the steps that a playing request of a user is received, and playing request parameters are acquired, wherein the playing request parameters include a user signature and other parameters, and other parameters at least include a user ID; a secret key corresponding to the user ID is determined according to the user ID of the playing request of the user; a verification signature is generated based on other parameters and the secret key; and the user signature and the verification signature are compared, and the playing request of the user is refused when the user signature and the verification signature are not matched. The invention also provides an anti-stealing-link system so that the possibility of link stealing can be reduced, stealing prevention is enabled to be more thorough, and the workload of the stealing prevention process can also be reduced.
Description
Technical field
The present embodiments relate to internet security technical field, particularly relate to a kind of anti-stealing link method and be
System.
Background technology
Along with Internet technology and the fast development of multimedia technology, substantial amounts of safety problem is arisen at the historic moment,
Stealing chain is exactly one side therein.Steal chain and refer to that service provider oneself does not provide the content of service, pass through
Technological means walks around other gainful end-user interface (such as advertisement), directly on the website of oneself
There is provided the service content of other service provider to end user, section end user browses and clicking rate.
Such as, in actual application, some illegal businessmans can pass through correlation technique (such as web crawlers technology)
Crawl URL address (the Uniform Resource of the files in stream media that multimedia service provider provides
Locator, URL), the sky of oneself will be put into after some coding changes inside URL address
In between, when user wants to watch this video, just can directly play after just clicking directly on this link,
And real service provider does not knows the most stolen chain of resource of oneself, provide to real service
Business causes huge economic loss.
Stealing during chain, beneficiary does not provide resource or provides little resource, and real clothes
Business provider but can not get any income, and still suffers from a series of danger brought because of stolen chain
Evil, such as: chain is stolen in website can consume the bandwidth of stolen chain website in a large number, causes the access speed of stolen chain website
Spending slack-off, real clicking rate perhaps can be the least, and if existing the most such in a station server
Stealing chain situation, the speed of server will decline, and network card pauses, and brings bad experience to user, also
Seriously compromise the interests of stolen chain website, if more serious chain website of stealing also has pornographic, reaction content,
More the fame of stolen chain website can be caused and have a strong impact on.Therefore the Internet especially wireless Internet safety
Field, steals chain security protection imperative.
Existing door chain scheme can be divided into the most several by principle:
1) filename or file directory are irregularly changed
This anti-stealing link method is, title or address by random change resource file realize antitheft
The function of chain.The method advantage is simple, and shortcoming is that workload is very big, and may affect use
The normal download at family.
2) referer is limited
The principle of this door chain is, limits according to the HTTP_REFERER field of HTTP request
It it is whether the request initiated of trusted sources.Or can realize in conjunction with overwrite function such as .htaccess
Further door chain function.
The method breaks through difficulty compared to the first and wants big.Shortcoming be then to access every time be required for behaviour
Make .htaccess file performance is had an impact, open overwrite function in service end simultaneously and have
Limit, and user can break through restriction by the way of camouflage HTTP_REFERER.
3) encryption certification
This door chain mode, first obtains user profile from client, then according to specific rule
User profile is formed encrypted characters string as authentication information, pass to backstage anti-stealing link system and carry out
Authentication.Only being proved to be successful, user passed to by the file that service end just can need user, but this
The mode of kind is easily cracked so that door chain is the most thorough.
4) file camouflage
This anti-stealing link method needs the function of service end to be coordinated, and principle needs request as user exactly
The when of corresponding resource, service end can to sess ion or cookie of user or
HTTP_REFERER carries out school inspection.
The method is owing to will not expose the true address of file, and can verify the identity of user,
Therefore door chain effect is fine.But this service judges, therefore owing to user profile is done some by needs
Efficiency can be affected, and is not suitable for this service scenarios of video request program.
Summary of the invention
In order to reduce in door chain workload and solve reference address and be easily forged and encrypted characters string holds
The halfway situation of door chain being easily cracked and cause, on the one hand, the embodiment of the present invention provides one anti-
Steal chain method, including:
Receiving the playing request of user, obtain playing request parameter, described playing request parameter includes user
Signature and other parameters, other parameters described at least include ID;
The ID in playing request according to described user, determines the key corresponding with described ID;
Signature verification is generated based on other parameters described and described key;
Relatively described user's signature and described signature verification, when described user's signature with described signature verification not
During coupling, the playing request of refusal user.
The embodiment of the present invention provides a kind of anti-stealing link system, including:
Receiver module, for receiving the playing request of user, obtains playing request parameter, and described broadcasting please
Asking parameter to include user's signature and other parameters, other parameters described at least include ID;
Key determines module, for according to the ID in the playing request of described user, determines with described
The key that ID is corresponding;
Signature verification generation module, for generating signature verification based on other parameters described and described key;
Signature comparison module, for relatively described user's signature and described signature verification;
Playing request processing module, for when described user's signature does not mates with described signature verification, refuses
The playing request of user absolutely.
The anti-stealing link method of embodiment of the present invention offer and system, by the playing request to reception user,
Obtaining playing request parameter, described playing request parameter includes user's signature and other parameters, described other
Parameter at least includes ID;The ID in playing request according to described user, determines and described use
The key that family ID is corresponding;Signature verification is generated based on other parameters described and described key;Relatively described use
Family signature and described signature verification, when described user's signature does not mates with described signature verification, refusal is used
The mode of the playing request at family carries out the antitheft possibility decreasing stolen chain so that antitheft more thorough,
Also mitigate simultaneously antitheft during workload.
Accompanying drawing explanation
For the technical scheme being illustrated more clearly that in the embodiment of the present invention, in embodiment being described below
The required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is this
Some bright embodiments, for those of ordinary skill in the art, before not paying creative work
Put, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
Fig. 1 is the flow chart of the anti-stealing link method of one embodiment of the invention;
Fig. 2 is the flow chart of the anti-stealing link method of another embodiment of the present invention;
Fig. 3 is the schematic diagram of the anti-stealing link system of one embodiment of the invention.
Detailed description of the invention
For making the purpose of the embodiment of the present invention, technical scheme and advantage clearer, below in conjunction with this
Accompanying drawing in bright embodiment, is clearly and completely described the technical scheme in the embodiment of the present invention,
Obviously, described embodiment is a part of embodiment of the present invention rather than whole embodiments.Based on
Embodiment in the present invention, those of ordinary skill in the art are obtained under not making creative work premise
The every other embodiment obtained, broadly falls into the scope of protection of the invention.
It should be noted that in the case of not conflicting, in embodiment in the application and embodiment
Involved technical characteristic can be mutually combined each other.
It is right that the present invention can be applicable in various video website (as happy regarded, excellent cruel, PPTV, the strange skill of love etc.)
Under the program request of video, the various scenes such as live.
The embodiment of the present invention can be passed through hardware processor (hardware processor) and realize phase
Close functional module.
Fig. 1 is the schematic flow sheet of anti-stealing link method embodiment of the present invention.As it is shown in figure 1, the present invention prevents
Steal chain method to include:
Step 101: receive the playing request of user, obtains playing request parameter, and described playing request is joined
Number includes user's signature and other parameters, and other parameters described at least include ID;
Step 102: according to the ID in the playing request of described user, determines and described ID pair
The key answered;
Step 103: generate signature verification based on other parameters described and described key;
Step 104: relatively described user's signature and described signature verification, when described user's signature is with described
When signature verification is not mated, the playing request of refusal user.
As in figure 2 it is shown, the anti-stealing link method of another embodiment, including:
Step 201: receive the playing request of user, obtains playing request parameter, and described playing request is joined
Number includes user's signature and other parameters, and other parameters described at least include ID and request time stamp;
Step 202: according to the ID in the playing request of described user, determines and described ID pair
The key answered;
Step 203: generate signature verification based on other parameters described and described key;
Step 204: relatively described user's signature and described signature verification;
Step 205: when described user's signature does not mates with described signature verification, the broadcasting of refusal user
Request.
Step 206: when described signature mates with described signature verification, when determining whether described request
Between stab whether be positioned at predetermined effective duration, when described timestamp exceedes described predetermined effective duration, refuse
The playing request of user absolutely.
When above-mentioned signature verification is passed through, it is believed that request time stamp information is believable, and then could be right
Request time stamp is verified.
Whether server is positioned at predetermined effective duration according to request time stamp, enters the use authority of user
Row verification, verify by time, just understand send stream medium data to user.
Whether server is positioned at predetermined effective duration according to request time stamp, during by judging described request
Between stamp exceed described predetermined effective duration and carry out real-time authorized user and use the time of resource, thus preferably
Ensure that the safe handling of resource, be more conducive to the use to resource and control and management.
Above-mentioned steps " generates signature verification based on other parameters described and described key " and including:
Based on other parameters described, control parameters/key/value table, determine the key corresponding with other parameters described/
Value ordered series of numbers, sorts described key/value ordered series of numbers according to predefined procedure and is spliced to form the first character string;
After described character string, splice described key generate the second character string;
Calculate the md5 value of described second character string;
Described md5 value is converted to 16 system character strings, generates signature verification.
In order to make server end mate with client, thus carry out the data between server end and client
Linking up, above-mentioned predefined procedure is the ascending order for key.
Above-mentioned first character string is by gpc (get player config obtains video playback configuration information)
After other parameters in the playing request of user are arranged by system according to the ascending order order of key, by key
Value and value value are linked in sequence composition.Leave in after character string assembly in gpc system.
Other parameters described in above-described embodiment the most also include calling api interface title, interface version.
According to the difference of other parameters in different playing request, such as, access ID, timestamp, API connect
Mouth title, the difference of interface version, it is possible to accomplish each with having independent character string information per family, should
Character string is difficult to imitated, if after stealing character string described in any falsification of chain person, just cannot pass through checking,
Accordingly will denied access service.
Certainly, in the middle of actual application, other parameters above-mentioned are for accessing ID, timestamp, API
Interface name, interface version but be not restricted to access ID, timestamp, api interface title,
Interface version, other parameters in described playing request are according to user's program request or live concrete condition
Fixed, such as, other parameters can also be the activity name of user live broadcast or program request, live or program request
Time started, the end time, live or program request stream code check type (such as smoothness, SD, high definition,
Super clear, original painting), the activity watched of play mode (real-time live broadcast, delay live) and user
Type (news conference, wedding, annual meeting, physical culture, finance and economics, game, interview) etc..
Above-mentioned with playing request in parameter/key/value table corresponding to other parameters be according to historic user
Live or program request request situation preset, and this form is stored in data base, to be used
Time recalled the playing request parameter comparison with user, determine the key corresponding with parameter and key institute
Corresponding value.Meanwhile, this known parameter/key/value table can also regularly or be carried out as required
Update, improve the degree of accuracy of form.Such as, up-to-date go out a TV play or film, the most just
Want adaptive and to be correlated with this TV play or the title of film at described parameter/key/value table
Some parameters add in described parameter/key/value table, to ensure that following operation does not haves mistake
By mistake.
In real life, the life stress of people is very big, particularly Beijing, Shanghai, Guangzhou, Shenzhen
Working clan, rhythm of life is increasingly faster, works increasing, and the pressure lived and work is the most more and more
Greatly, in order to alleviate pressure, people would generally utilize the free time on Sunday on Saturday from video website (example
As excellent cruel, happy depending on, PPTV, MPC etc.) in search the highest films viewing of some scorings entertain from
Oneself, loosen mood, but point often find after opening that these the highest films of marking are usually member's film,
Needing to pay and could watch, need not pay again to meet the wish oneself seen a film, people can be the most sharp
By the resource of the Internet, browse various website, to expect to watch these films, the most illegal business
The viewing address that video website will be stolen to get some advantage from it by family is supplied to user, thus causes video net
The resource stood is stolen and the bandwidth consumption of stolen website is serious, and network speed declines, in order to effectively hit
Illegal businessman, safeguards the interests of video website, at this moment can by receive ID, api interface title,
Interface version, request time stamp, user watch class belonging to film title, program request film duration and film
Type (such as horror film, comedy, romance movie, acrobatic fighting film) etc., and according to the ID of user determine with
The key that described ID is corresponding, then generates signature verification according to above-mentioned parameter and key, if described use
When family signature does not mates with described signature verification, then the mode of the playing request refusing user reaches to prevent
Steal the effect of chain, safeguard the interests of video website.
Further improvement is that of anti-stealing link method in above-described embodiment, when signature verification is passed through, permissible
Know that request time stamp information is genuine and believable, in order to reach more effectively door chain, to enter further
Row judges whether described request time stamp is positioned at predetermined effective duration, when described timestamp exceedes described pre-
During fixed effective duration, the playing request of refusal user.Thus carry out real-time authorized user and use resource
Time, thus better assure that the safe handling of resource, it is more conducive to the use to resource and controls and pipe
Reason.
The present invention does not interferes with the link that visitor is asked, and nor affects on web site traffic logic, it is ensured that
Convenience, easily using effect;By the signature verification in access request, character string are verified with in time
Between stab Information Authentication multiple safety, the possibility of its stolen chain has been dramatically reduced, has solved from principle
Multiple visitors use same agency to conduct interviews website, and visitor IP is identical and causes cannot be distinguished by
Problem.The feasibility of the present invention is high, and most of websites can be realized by simple techniques such as filters, no
Can business original to website impact.
The anti-stealing link method that the embodiment of the present invention provides, by the playing request to reception user, acquisition is broadcast
Putting required parameter, described playing request parameter includes user's signature and other parameters, and other parameters described are extremely
Include ID less;The ID in playing request according to described user, determines and described ID
Corresponding key;Signature verification is generated based on other parameters described and described key;When described user's signature
When not mating with described signature verification, the mode of playing request of refusal user carry out antitheft decrease stolen
The possibility of chain so that antitheft more thorough, also mitigate simultaneously antitheft during workload.
Fig. 3 is the structural representation of anti-stealing link system embodiment of the present invention.As it is shown on figure 3, the present invention prevents
Robber's catenary system includes:
Receiver module, for receiving the playing request of user, obtains playing request parameter, and described broadcasting please
Asking parameter to include user's signature and other parameters, other parameters described at least include ID;
Key determines module, for according to the ID in the playing request of described user, determines with described
The key that ID is corresponding;
Signature verification generation module, for generating signature verification based on other parameters described and described key;
Signature comparison module, for relatively described user's signature and described signature verification;
Playing request processing module, for when described user's signature does not mates with described signature verification, refuses
The playing request of user absolutely.
The anti-stealing link system of another embodiment of the present invention includes:
Receiver module, for receiving the playing request of user, obtains playing request parameter, and described broadcasting please
Asking parameter to include user's signature and other parameters, other parameters described at least include ID and request time
Stamp;
Key determines module, for according to the ID in the playing request of described user, determines with described
The key that ID is corresponding;
Signature verification generation module, for generating signature verification based on other parameters described and described key;
Signature comparison module, for relatively described signature and described signature verification;
Timeliness judge module, for when described signature mates with described signature verification, determines whether institute
State whether request time stamp is positioned at predetermined effective duration;
Playing request processing module, for when described user's signature does not mates with described signature verification, refuses
The playing request of user absolutely, when described timestamp exceedes described predetermined effective duration, refusal user broadcasts
Put request.
Above-mentioned verification generation module includes:
First text string generation unit, for based on other parameters described, control parameters/key/value table, really
The fixed key/value ordered series of numbers corresponding with other parameters described, sorts described key/value ordered series of numbers according to predefined procedure and spells
Connect formation the first character string;
Second text string generation unit, generates the second character for splicing described key after described character string
String;
Md5 computing unit, for calculating the md5 value of described second character string;
Signature verification signal generating unit, for described md5 value is converted to 16 system character strings, generates school
Sign test name.
In above-mentioned first text string generation unit, described predefined procedure is the ascending order for key.
Other parameters described in above-mentioned receiver module the most also include calling api interface title, interface
Version.
The anti-stealing link system that the embodiment of the present invention provides, by receiver module, key production module, school
Test signature generation module, signature comparison module and playing request processing module and carry out straight at user video
Broadcast or door chain in on-demand process, decrease the possibility of stolen chain so that be antitheft more thorough,
Also mitigate simultaneously antitheft during workload.
Device embodiment described above is only schematically, wherein said illustrates as separating component
Unit can be or may not be physically separate, the parts shown as unit can be or
Person may not be physical location, i.e. may be located at a place, or can also be distributed to multiple network
On unit.Some or all of module therein can be selected according to the actual needs to realize the present embodiment
The purpose of scheme.Those of ordinary skill in the art are not in the case of paying performing creative labour, the most permissible
Understand and implement.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive each reality
The mode of executing can add the mode of required general hardware platform by software and realize, naturally it is also possible to by firmly
Part.Based on such understanding, the portion that prior art is contributed by technique scheme the most in other words
Dividing and can embody with the form of software product, this computer software product can be stored in computer can
Read in storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions with so that one
Computer equipment (can be personal computer, server, or the network equipment etc.) performs each to be implemented
The method described in some part of example or embodiment.
Last it is noted that above example is only in order to illustrate technical scheme, rather than to it
Limit;Although the present invention being described in detail with reference to previous embodiment, the ordinary skill of this area
Personnel it is understood that the technical scheme described in foregoing embodiments still can be modified by it, or
Person carries out equivalent to wherein portion of techniques feature;And these amendments or replacement, do not make corresponding skill
The essence of art scheme departs from the spirit and scope of various embodiments of the present invention technical scheme.
Claims (10)
1. an anti-stealing link method, it is characterised in that including:
Receiving the playing request of user, obtain playing request parameter, described playing request parameter includes user
Signature and other parameters, other parameters described at least include ID;
The ID in playing request according to described user, determines the key corresponding with described ID;
Signature verification is generated based on other parameters described and described key;
Relatively described user's signature and described signature verification, when described user's signature with described signature verification not
During coupling, the playing request of refusal user.
Method the most according to claim 1, it is characterised in that when other parameters described include request
Between stab,
When described signature mates with described signature verification, determine whether that described request time stabs whether position
In predetermined effective duration,
When described timestamp exceedes described predetermined effective duration, the playing request of refusal user.
Method the most according to claim 1, it is characterised in that described based on other parameters described and
Described key generates signature verification and includes:
Based on other parameters described, control parameters/key/value table, determine the key corresponding with other parameters described/
Value ordered series of numbers, sorts described key/value ordered series of numbers according to predefined procedure and is spliced to form the first character string;
After described character string, splice described key generate the second character string;
Calculate the md5 value of described second character string;
Described md5 value is converted to 16 system character strings, generates signature verification.
Method the most according to claim 3, it is characterised in that described predefined procedure is for key
Ascending order.
5. according to the method according to any one of claim 1-4, it is characterised in that other parameters described
Also include calling api interface title, interface version.
6. an anti-stealing link system, including:
Receiver module, for receiving the playing request of user, obtains playing request parameter, and described broadcasting please
Asking parameter to include user's signature and other parameters, other parameters described at least include ID;
Key determines module, for according to the ID in the playing request of described user, determines with described
The key that ID is corresponding;
Signature verification generation module, for generating signature verification based on other parameters described and described key;
Signature comparison module, for relatively described user's signature and described signature verification;
Playing request processing module, for when described user's signature does not mates with described signature verification, refuses
The playing request of user absolutely.
System the most according to claim 6, it is characterised in that when other parameters described include request
Between stab, described system also includes timeliness judge module, for determining described label when described signature comparison module
Name is when mating with described signature verification, determine whether described request time stab whether be positioned at predetermined effective time
In long;
Described playing request processing module, for when described signature mates with described signature verification but described asks
When seeking time stamp exceedes described predetermined effective duration, the playing request of refusal user.
System the most according to claim 6, it is characterised in that described signature verification generation module bag
Include:
First text string generation unit, for based on other parameters described, control parameters/key/value table, determines
The key/value ordered series of numbers corresponding with other parameters described, sorts described key/value ordered series of numbers according to predefined procedure and splices
Form the first character string;
Second text string generation unit, generates the second character for splicing described key after described character string
String;
Md5 computing unit, for calculating the md5 value of described second character string;
Signature verification signal generating unit, for described md5 value is converted to 16 system character strings, generates school
Sign test name.
System the most according to claim 8, it is characterised in that described predefined procedure is for key
Ascending order.
10. according to the system described in claim 6-9, it is characterised in that other parameters described also include
Call api interface title, interface version.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510890714.9A CN105915494A (en) | 2015-12-07 | 2015-12-07 | Anti-stealing-link method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510890714.9A CN105915494A (en) | 2015-12-07 | 2015-12-07 | Anti-stealing-link method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105915494A true CN105915494A (en) | 2016-08-31 |
Family
ID=56744101
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510890714.9A Pending CN105915494A (en) | 2015-12-07 | 2015-12-07 | Anti-stealing-link method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105915494A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106485539A (en) * | 2016-09-18 | 2017-03-08 | 百川通联(北京)网络技术有限公司 | A kind of method and system preventing advertisement cheating |
CN107809672A (en) * | 2017-10-10 | 2018-03-16 | 武汉斗鱼网络科技有限公司 | Detect method, storage medium, equipment and the system of the secondary packing of application installation package |
CN108322449A (en) * | 2018-01-09 | 2018-07-24 | 武汉斗鱼网络科技有限公司 | A kind of method, storage medium, equipment and system for preventing video flowing stolen |
WO2018176531A1 (en) * | 2017-03-31 | 2018-10-04 | 武汉斗鱼网络科技有限公司 | Video request and video playing method and apparatus |
CN109413000A (en) * | 2017-08-15 | 2019-03-01 | 吴波 | A kind of anti-stealing link method and door chain gateway system |
CN110034922A (en) * | 2019-04-22 | 2019-07-19 | 湖南快乐阳光互动娱乐传媒有限公司 | Request processing method, processing unit and requests verification method, verifying device |
CN110138716A (en) * | 2018-02-09 | 2019-08-16 | 网宿科技股份有限公司 | A kind of offer of key, video broadcasting method, server and client |
CN110413110A (en) * | 2019-07-05 | 2019-11-05 | 深圳市工匠社科技有限公司 | The control method and Related product of virtual role |
CN110519609A (en) * | 2019-07-23 | 2019-11-29 | 广州易方信息科技股份有限公司 | A method of illegal bootlegging broadcasting when monitoring live streaming |
CN114286134A (en) * | 2021-12-23 | 2022-04-05 | 天翼视讯传媒有限公司 | Method and system for identifying play hotlinking behavior applied to interface request |
CN115001710A (en) * | 2022-06-01 | 2022-09-02 | 山东福生佳信科技股份有限公司 | Video playing request management method based on signature parameter updating |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103036924A (en) * | 2011-09-29 | 2013-04-10 | 深圳市快播科技有限公司 | Chaining processing method and chaining processing system |
CN103986735A (en) * | 2014-06-05 | 2014-08-13 | 北京赛维安讯科技发展有限公司 | CDN (content distribution network) antitheft system and antitheft method |
-
2015
- 2015-12-07 CN CN201510890714.9A patent/CN105915494A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103036924A (en) * | 2011-09-29 | 2013-04-10 | 深圳市快播科技有限公司 | Chaining processing method and chaining processing system |
CN103986735A (en) * | 2014-06-05 | 2014-08-13 | 北京赛维安讯科技发展有限公司 | CDN (content distribution network) antitheft system and antitheft method |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106485539A (en) * | 2016-09-18 | 2017-03-08 | 百川通联(北京)网络技术有限公司 | A kind of method and system preventing advertisement cheating |
CN106485539B (en) * | 2016-09-18 | 2019-08-06 | 北京联动优创文化传媒有限公司 | A kind of method and system for preventing advertisement from practising fraud |
WO2018176531A1 (en) * | 2017-03-31 | 2018-10-04 | 武汉斗鱼网络科技有限公司 | Video request and video playing method and apparatus |
CN109413000A (en) * | 2017-08-15 | 2019-03-01 | 吴波 | A kind of anti-stealing link method and door chain gateway system |
CN109413000B (en) * | 2017-08-15 | 2021-06-18 | 刘其星 | Anti-stealing-link method and anti-stealing-link network relation system |
CN107809672A (en) * | 2017-10-10 | 2018-03-16 | 武汉斗鱼网络科技有限公司 | Detect method, storage medium, equipment and the system of the secondary packing of application installation package |
CN108322449A (en) * | 2018-01-09 | 2018-07-24 | 武汉斗鱼网络科技有限公司 | A kind of method, storage medium, equipment and system for preventing video flowing stolen |
CN110138716A (en) * | 2018-02-09 | 2019-08-16 | 网宿科技股份有限公司 | A kind of offer of key, video broadcasting method, server and client |
US11055429B2 (en) | 2018-02-09 | 2021-07-06 | Wangsu Science & Technology Co., Ltd. | Key providing method, video playing method, server and client |
CN110034922A (en) * | 2019-04-22 | 2019-07-19 | 湖南快乐阳光互动娱乐传媒有限公司 | Request processing method, processing unit and requests verification method, verifying device |
CN110413110A (en) * | 2019-07-05 | 2019-11-05 | 深圳市工匠社科技有限公司 | The control method and Related product of virtual role |
CN110519609A (en) * | 2019-07-23 | 2019-11-29 | 广州易方信息科技股份有限公司 | A method of illegal bootlegging broadcasting when monitoring live streaming |
CN114286134A (en) * | 2021-12-23 | 2022-04-05 | 天翼视讯传媒有限公司 | Method and system for identifying play hotlinking behavior applied to interface request |
CN114286134B (en) * | 2021-12-23 | 2024-02-27 | 天翼视讯传媒有限公司 | Method and system for identifying and playing hotlinking behavior in interface request |
CN115001710A (en) * | 2022-06-01 | 2022-09-02 | 山东福生佳信科技股份有限公司 | Video playing request management method based on signature parameter updating |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105915494A (en) | Anti-stealing-link method and system | |
US11658979B2 (en) | Systems and methods for efficient and secure temporary anonymous access to media content | |
US8601586B1 (en) | Method and system for detecting web application vulnerabilities | |
CN103957436B (en) | A kind of video anti-stealing link method based on OTT business | |
US8307099B1 (en) | Identifying use of software applications | |
WO2016184216A1 (en) | Link-stealing prevention method, link-stealing prevention server, and client side | |
CN104869102B (en) | Authorization method, device and system based on xAuth agreement | |
US20110029555A1 (en) | Method, system and apparatus for content identification | |
CN107911282B (en) | Network system for realizing implantation of third-party application facing social network | |
US10523986B2 (en) | Methods for identifying, disrupting and monetizing the illegal sharing and viewing of digital and analog streaming content | |
CN109413000B (en) | Anti-stealing-link method and anti-stealing-link network relation system | |
CN105357190A (en) | Method and system for performing authentication on access request | |
US20210218776A1 (en) | Network policy service for dynamic media | |
CN108683631B (en) | Method and system for preventing scanning of authority file | |
CN1953452B (en) | A method for dynamic certification and authorization for stream media | |
CN115242546A (en) | Industrial control system access control method based on zero trust architecture | |
US8386775B2 (en) | Tolerant key verification method | |
TWI640194B (en) | Content delivery network audio and video service anti-theft connection method | |
CN106888200B (en) | Identification association method, information sending method and device | |
CN105847262A (en) | Anti-stealing-link method and system | |
Ghiani et al. | Security in migratory interactive web applications | |
CN110381375A (en) | A kind of determining method, client and server for stealing brush data | |
Hu et al. | Measurement of the usage of web clips in underground economy | |
KR100510908B1 (en) | A security method of streaming service with media player | |
CN108234383A (en) | Information access method and secure access service device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20160831 |
|
WD01 | Invention patent application deemed withdrawn after publication |