CN110365688A - Anti-stealing link method and device - Google Patents

Anti-stealing link method and device Download PDF

Info

Publication number
CN110365688A
CN110365688A CN201910655794.8A CN201910655794A CN110365688A CN 110365688 A CN110365688 A CN 110365688A CN 201910655794 A CN201910655794 A CN 201910655794A CN 110365688 A CN110365688 A CN 110365688A
Authority
CN
China
Prior art keywords
user
unique identifier
globally unique
antitheft
verifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910655794.8A
Other languages
Chinese (zh)
Other versions
CN110365688B (en
Inventor
邵灿
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Happly Sunshine Interactive Entertainment Media Co Ltd
Original Assignee
Hunan Happly Sunshine Interactive Entertainment Media Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Happly Sunshine Interactive Entertainment Media Co Ltd filed Critical Hunan Happly Sunshine Interactive Entertainment Media Co Ltd
Priority to CN201910655794.8A priority Critical patent/CN110365688B/en
Publication of CN110365688A publication Critical patent/CN110365688A/en
Application granted granted Critical
Publication of CN110365688B publication Critical patent/CN110365688B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources

Abstract

The present invention relates to a kind of Internet technical field, more particularly to a kind of anti-stealing link method and device, in this method, according to the identifier distribution request of client, a globally unique identifier is distributed for the first User ID that client is sent.When the receive scheduler dispatches first antitheft verifying message, the first antitheft second user ID verified in message and globally unique identifier are verified, it determines that the corresponding user of second user ID is legal, prevents illegal user from stealing the resource address of resource supplier by analog subscriber ID.When receiving the second antitheft verifying message of CDN node transmission, the second antitheft third User ID verified in message and globally unique identifier are verified, determine that the corresponding user of the third User ID is legal, after preventing illegal user from illegally obtaining resource address by way of stealing chain, data resource is obtained from the corresponding CDN node of resource supplier, causes the bandwidth loss of resource supplier.

Description

Anti-stealing link method and device
Technical field
The present invention relates to Internet technical fields, more particularly to a kind of anti-stealing link method and device.
Background technique
As the improvement of people's living standards, the intelligent terminals such as mobile phone, computer are applied generally the day in people Often in life.User can obtain the data resources such as video, audio, text by intelligent terminal, to meet user in work Make and demand in life.
In order to meet the needs of user is to data resource, resource supplier would generally establish the money of the exclusive resource supplier Source website, and according to the web site url of the resource website from content distributing network (Content Delivery Network, CDN) Data resource needed for middle acquisition user.However, under the current network environment, there are some illegal users in order to avoid payment is high High bandwidth expense, steal the web site url of the resource supplier resource website by illegal technological means, and will steal Web site url is used as other commercial uses.When illegal user side passes through the web site url stolen, acquisition data are provided from CDN system When source, the bandwidth of resource supplier side will be consumed largely, and the high bandwidth expense generated at this time can only be by resource provisioning Quotient undertakes, and certain economic loss is brought to resource supplier.
Summary of the invention
The present invention provides a kind of anti-stealing link methods, in this way, preventing illegal user from stealing resource address, or pass through Data resource is obtained from the corresponding CDN node of resource supplier after the resource address that back door obtains, avoids resource confession Answer the bandwidth loss of quotient.
The present invention also provides a kind of antitheft chain apparatus, to guarantee the realization and application of the above method in practice.
A kind of anti-stealing link method, comprising:
When receiving the identifier distribution request of client transmission, include in the identifier distribution request the is obtained One User ID;
According to pre-set identifier generating algorithm, globally unique identifier corresponding with first User ID is generated Symbol, and the globally unique identifier is sent to the client, it triggers the client and is sent out to pre-set scheduler Send the resource address requests for carrying the globally unique identifier and first User ID;
When receiving the first antitheft verifying message that the scheduler is sent according to the resource address requests, institute is obtained The second user ID for including in the first antitheft verifying message and the globally unique identifier are stated, and according to the globally unique mark Know symbol, verifies whether the corresponding user of the second user ID is legitimate user;
When the corresponding user of the second user ID be legitimate user when, determine the corresponding user of the second user ID with The corresponding user of first User ID is same user, and triggers the scheduler and send and the resource to the client The corresponding resource address of Address requests carries so that the client is sent to pre-set content distributing network CDN node The resource download request of the resource address, the first User ID and globally unique identifier;
When receiving the second antitheft verifying message that the CDN node is sent according to the resource download request, obtain The third User ID and the globally unique identifier for including in the second antitheft verifying message, and according to described globally unique Identifier, verifies whether the corresponding user of the third User ID is legitimate user;
When the corresponding user of the third User ID be legitimate user when, determine the corresponding user of the third User ID with The corresponding user of first User ID is same user, and triggers the CDN node and send and the money to the client Corresponding data resource is requested in source downloading.
Above-mentioned method, it is optionally, described according to pre-set identifier generating algorithm, it generates and first user The corresponding globally unique identifier of ID, comprising:
It determines the current request time when client sends the identifier distribution request, and obtains the client Corresponding equipment identification information;
According to pre-set identifier generating algorithm, to the current request time, the equipment identification information and institute It states the first User ID to be calculated, generates globally unique identifier corresponding with first User ID.
Above-mentioned method, it is optionally, described according to the globally unique identifier, it is corresponding to verify the second user ID Whether user is legitimate user, comprising:
Obtain the first User ID corresponding with the globally unique identifier;
First User ID is matched with the second user ID, verifies first User ID and described second Whether User ID is consistent;
When first User ID is consistent with the second user ID, judge corresponding with the described first antitheft checking request Verifying number whether be more than pre-set first verification threshold;
When the verifying number corresponding with the described first antitheft checking request is less than first verification threshold, really Determining the corresponding user of the second user ID is legitimate user;
When the verifying number corresponding with the described first antitheft checking request is more than first verification threshold, determine The corresponding user of the second user ID is illegal user.
Above-mentioned method, optionally, further includes:
When the corresponding user of the second user ID be illegal user when, determine the corresponding user of the second user ID with The corresponding non-same user of user of first User ID, and trigger the scheduler interrupts to the client send with it is described The corresponding resource address of resource address requests.
Above-mentioned method, it is optionally, described according to the globally unique identifier, it is corresponding to verify the third User ID Whether user is legitimate user, comprising:
Obtain the first User ID corresponding with the globally unique identifier;
First User ID is matched with the third User ID, verifies first User ID and the third Whether User ID is consistent;
When first User ID is consistent with the third User ID, judge corresponding with the described second antitheft checking request Verifying number whether be more than pre-set second verification threshold;
When the verifying number corresponding with the described second antitheft checking request is less than second verification threshold, really Determining the corresponding user of the third User ID is legitimate user;
When the verifying number corresponding with the described second antitheft checking request is more than second verification threshold, determine The corresponding user of the third User ID is illegal user.
Above-mentioned method, optionally, further includes:
When the corresponding user of the third User ID be illegal user when, determine the corresponding user of the third User ID with The corresponding non-same user of user of first User ID, and trigger the CDN node and interrupt and sent to the client and institute State the corresponding resource address of resource download request.
A kind of antitheft chain apparatus, comprising:
Acquiring unit, for when receiving the identifier distribution request of client transmission, obtaining the identifier distribution The first User ID for including in request;
Generation unit, for generating corresponding with first User ID according to pre-set identifier generating algorithm Globally unique identifier, and the globally unique identifier is sent to the client triggers the client to setting in advance The scheduler dispatches set carry the resource address requests of the globally unique identifier and first User ID;
First authentication unit, for first antitheft when receive the scheduler according to the resource address requests and send When verifying message, the second user ID for including in the described first antitheft verifying message and the globally unique identifier are obtained, and According to the globally unique identifier, verify whether the corresponding user of the second user ID is legitimate user;
First trigger unit, for determining described second when the corresponding user of the second user ID is legitimate user The corresponding user of User ID user corresponding with first User ID is same user, and triggers the scheduler to the visitor Family end sends corresponding with resource address requests resource address, so that the client is to pre-set content delivery network Network CDN node sends the resource download request for carrying the resource address, the first User ID and globally unique identifier;
Second authentication unit, for when receive the CDN node according to the resource download request sends second prevent When stealing verifying message, the third User ID and the globally unique identifier for including in the described second antitheft verifying message are obtained, And according to the globally unique identifier, verify whether the corresponding user of the third User ID is legitimate user;
Second trigger unit, for determining the third when the corresponding user of the third User ID is legitimate user The corresponding user of User ID user corresponding with first User ID is same user, and triggers the CDN node to described Client sends data resource.
Above-mentioned device, optionally, the generation unit, comprising:
First obtains subelement, when current request when for determining that the client sends the identifier distribution request Between, and obtain the corresponding equipment identification information of the client;
Subelement is generated, for according to pre-set identifier generating algorithm, to the current request time, described is set Standby identification information and first User ID are calculated, and globally unique identifier corresponding with first User ID is generated.
Above-mentioned device, optionally, first authentication unit, comprising:
Second obtains subelement, for obtaining the first User ID corresponding with the globally unique identifier;
First verifying subelement, for matching first User ID with the second user ID, described in verifying Whether the first User ID and the second user ID are consistent;
First judgment sub-unit, for when first User ID is consistent with the second user ID, judge with it is described Whether the corresponding verifying number of the first antitheft checking request is more than pre-set first verification threshold;
First determines subelement, for being less than institute when the verifying number corresponding with the described first antitheft checking request When stating the first verification threshold, determine that the corresponding user of the second user ID is legitimate user;
Second determines subelement, for when the verifying number corresponding with the described first antitheft checking request is more than described in When the first verification threshold, determine that the corresponding user of the second user ID is illegal user.
Above-mentioned device, optionally, second authentication unit, comprising:
Third obtains subelement, for obtaining the first User ID corresponding with the globally unique identifier;
Second verifying subelement, for matching first User ID with the third User ID, described in verifying Whether the first User ID and the third User ID are consistent;
Second judgment sub-unit, for when first User ID is consistent with the third User ID, judge with it is described Whether the corresponding verifying number of the second antitheft checking request is more than pre-set second verification threshold;
Third determines subelement, for being less than institute when the verifying number corresponding with the described second antitheft checking request When stating the second verification threshold, determine that the corresponding user of the third User ID is legitimate user;
4th determines subelement, for when the verifying number corresponding with the described second antitheft checking request is more than described in When the second verification threshold, determine that the corresponding user of the third User ID is illegal user.
A kind of storage medium, the storage medium include the instruction of storage, wherein in described instruction operation described in control Equipment where storage medium executes above-mentioned anti-stealing link method.
A kind of electronic equipment, including memory and one perhaps one of them or one of more than one instruction with Upper instruction is stored in memory, and is configured to execute above-mentioned anti-stealing link method by one or more than one processor.
Compared with prior art, the present invention includes the following advantages:
The present invention provides a kind of anti-stealing link methods, using this method, according to the identifier distribution request of client, for visitor The first User ID that family end is sent distributes a globally unique identifier.When the receive scheduler dispatches first antitheft verifying disappears When breath, the first antitheft second user ID verified in message and globally unique identifier are verified, determine second use ID corresponding user in family is legal, prevents illegal user from stealing the resource address of resource supplier by analog subscriber ID.Work as reception To CDN node send the second antitheft verifying message when, to this second it is antitheft verifying message in third User ID and the overall situation only One identifier is verified, and determines that the corresponding user of the third User ID is legal, prevents illegal user non-by way of stealing chain After method obtains resource address, data resource is obtained from the corresponding CDN node of resource supplier, the bandwidth of resource supplier is caused to damage It loses.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of invention for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 provides a kind of method flow diagram of anti-stealing link method for the embodiment of the present invention;
Fig. 2 provides a kind of another method flow diagram of anti-stealing link method for the embodiment of the present invention;
Fig. 3 provides a kind of another method flow diagram of anti-stealing link method for the embodiment of the present invention;
Fig. 4 provides a kind of structural schematic diagram of antitheft chain apparatus for the embodiment of the present invention;
Fig. 5 provides the equipment structure chart of a kind of electronic equipment for the embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
In this application, relational terms such as first and second and the like be used merely to by an entity or operation with Another entity or operation distinguish, and without necessarily requiring or implying between these entities or operation, there are any this realities The relationship on border perhaps sequence the terms "include", "comprise" or any other variant thereof is intended to cover non-exclusive inclusion, from And to include the process, method, article or equipments of a series of elements not only to include those elements, but also including not bright The other element really listed, or further include for elements inherent to such a process, method, article, or device.Do not having In the case where more limitations, the element that is limited by sentence "including a ...", it is not excluded that include the element process, There is also other identical elements in method, article or equipment.
The present invention can be used in numerous general or special purpose computing device environment or configurations.Such as: personal computer, service Device computer, handheld device or portable device, laptop device, multi-processor device including any of the above devices or devices Distributed computing environment etc..
The embodiment of the invention provides a kind of anti-stealing link method, this method can be applied in multiple systems platform, be executed Main body can be the global buffer system that globally unique identifier can be allocated in terminal or various mobile devices, The concrete meaning for stealing chain can be with are as follows: illegal user steals resource supplier corresponding resource website by illegal technological means Web site url.Wherein, which actually can be the resource address mentioned in the bright embodiment of this law.The method Method flow diagram is as shown in Figure 1, specifically include:
S101: it when receiving the identifier distribution request of client transmission, obtains and is wrapped in the identifier distribution request The first User ID contained;
In embodiments of the present invention, when user needs to obtain data resource, resource acquisition can be sent to client and asked It asks.When client is after the resource acquisition request for receiving user's transmission, according to the first User ID of the user to global buffer System sends identifier distribution request.When the global buffer system receive client transmission identifier distribution request when, Obtain corresponding first User ID of the user.
S102: it according to pre-set identifier generating algorithm, generates corresponding globally unique with first User ID Identifier, and the globally unique identifier is sent to the client, the client is triggered to pre-set scheduling Device sends the resource address requests for carrying the globally unique identifier and first User ID;
In embodiments of the present invention, raw according to pre-set identifier generating algorithm after getting the first User ID At globally unique identifier corresponding with first User ID.Wherein, which is the user of true legitimate user ID, and each User ID corresponding globally unique identifier when currently needing to obtain data resource is unique.Work as the overall situation After caching system generates globally unique identifier corresponding with first User ID, client is sent by the globally unique identifier End.The globally unique identifier that client can be distributed according to global buffer system, to scheduler dispatches resource address requests, to ask The scheduler is asked to send the resource address for obtaining data resource to client.
Wherein, client is to before scheduler dispatches resource address requests, by the first User ID and globally unique identifier Encapsulation is into the resource address requests.When client needs to obtain resource address, the first user is carried to the scheduler dispatches The resource address requests of ID and globally unique identifier.
It should be noted that the globally unique identifier can be the globally unique identifier of GSID, GUID or UUID form Symbol.The global buffer system, which can be, is set to can distribute according to User ID on client, scheduler or CDN node and its The server of corresponding globally unique identifier.The global buffer system can be global GSID caching system.
S103: when receiving the first antitheft verifying message that the scheduler is sent according to the resource address requests, The second user ID for including in the described first antitheft verifying message and the globally unique identifier are obtained, and according to the overall situation Unique identifier, verifies whether the corresponding user of the second user ID is legitimate user;
In embodiments of the present invention, when scheduler receives the resource address requests of client transmission, in order to prevent should Resource address requests are that illegal user passes through analogue data interface to scheduler dispatches resource address requests, and scheduler will be according to this Resource address requests generate the first antitheft verifying message, and send the first antitheft verifying message to the global buffer system.When complete After office's caching system receives the first antitheft verifying message, the second user ID for including in the antitheft verifying message and the overall situation are obtained Unique identifier.Wherein, second user ID may be first User ID, it is also possible to be that illegal user passes through analogue data Interface is used to steal the User ID of the illegal user of resource address.Therefore, the global buffer system is according to the globally unique identifier Whether legal symbol, verify the corresponding user of second user ID.
Optionally, when global buffer system receives the first antitheft verifying message of scheduler dispatches, first determine this The second user ID and globally unique identifier for carrying out the first antitheft verifying whether are contained in one antitheft verifying message.If packet Contain, then obtains the second user ID and globally unique identifier in the first antitheft verifying message.
S104: when the corresponding user of the second user ID is legitimate user, determine that the second user ID is corresponding User user corresponding with first User ID is same user, and triggers the scheduler and send to the client and institute The corresponding resource address of resource address requests is stated, so that the client is sent out to pre-set content distributing network CDN node Send the resource download request for carrying the resource address, the first User ID and globally unique identifier;
In embodiments of the present invention, when determining the corresponding user of second user ID is legitimate user, it is believed that the tune Spending resource address requests received by device is resource address requests of the client to the scheduler dispatches, and is not illegal The resource address requests that user is sent by analogue data interface.Meanwhile triggering the resource that the scheduler is sent according to client Address requests are to the client feedback resource address.The client, can be according to the resource address, after getting resource address One User ID and globally unique identifier send resource download request to CDN node.That is, the client can be by resource address, One User ID and globally unique identifier are encapsulated into resource download request, to request CDN node feedback data resource.
Optionally, it when the corresponding user of second user ID is legitimate user, produces and the first antitheft checking request Corresponding first triggering command, and the first triggering command is sent to scheduler, it is sent with triggering the scheduler to client Resource address.
S105: when receiving the second antitheft verifying message that the CDN node is sent according to the resource download request, The third User ID and the globally unique identifier for including in the described second antitheft verifying message are obtained, and according to the overall situation Unique identifier, verifies whether the corresponding user of the third User ID is legitimate user;
In embodiments of the present invention, CDN node is after the resource download request for receiving client transmission, according to the resource Downloading request generates the second antitheft verifying message, and sends the second antitheft verifying message to the global buffer system.The overall situation is slow Deposit system obtains the third User ID and globally unique identifier for including in the message according to the second antitheft verifying message.Its In, which may be first User ID, it is also possible to be the User ID of illegal user.Illegal user is by stealing After chain, according to the data resource for stealing the resource address analogue data interface acquisition resource supplier that chain obtains.Therefore, the overall situation is slow Whether legal deposit system verifies the corresponding user of the third User ID according to the globally unique identifier.
Optionally, when global buffer system receives the second antitheft verifying message of CDN node transmission, first determine this The third User ID and globally unique identifier for carrying out the second antitheft verifying whether are contained in two antitheft verifying message.If packet Contain, then obtains the third User ID and globally unique identifier in the second antitheft verifying message.
S106: when the corresponding user of the third User ID is legitimate user, determine that the third User ID is corresponding User user corresponding with first User ID be same user, and trigger the CDN node to the client send with The corresponding data resource of the resource download request.
In embodiments of the present invention, when determining the corresponding user of the third User ID is legitimate user, it is believed that the CDN Resource download request received by node is the client according to the first User ID, globally unique identifier and resource address The resource download request sent to the CDN node, and it is not simulation after illegal user steals resource address by illegal means The resource download request that data-interface is sent to the CDN node.Meanwhile CDN node is triggered under client feedback and the resource It carries and requests corresponding data resource.Client can be downloaded according to the data resource that CDN node is fed back.
Optionally, it when the corresponding user of third User ID is legitimate user, produces and the second antitheft checking request Corresponding second triggering command, and second triggering command is sent to CDN node, it is sent out with triggering the CDN node to client Send data resource.
In anti-stealing link method provided in an embodiment of the present invention, when global buffer system receives the identifier of client transmission When distribution request, the first User ID for including in the identifier distribution request is obtained.It is generated and is calculated by pre-set identifier Method generates globally unique identifier corresponding with the first User ID.And the globally unique identifier is sent to client.Client End can be according to first User ID and globally unique identifier, to scheduler dispatches resource address requests.Wherein, the resource address First User ID and globally unique identifier are carried in request.Scheduler is after receiving resource address requests, to the money Source address request is parsed, and the second user ID for including in the resource address requests and globally unique identifier are obtained.At this point, Second user ID and the first User ID may be same User ID, it is also possible to be used to steal the use of resource address for illegal user Family ID.Scheduler encapsulates second user ID and globally unique identifier into the first antitheft verifying message, to request this complete Office's caching system verifies the globally unique identifier and second user ID.The global buffer system antitheft is tested according to first Message is demonstrate,proved, obtains the second user ID for including in the message and globally unique identifier, and it is corresponding to verify second user ID Whether user is legitimate user.If legitimate user, it is determined that second user ID is the first User ID, while triggering scheduler To client feedback resource address.Client sends resource download request after receiving resource address, to CDN node.Work as CDN After node receives the resource download request of client, the second antitheft verifying message is sent to global buffer system, the overall situation is slow Deposit system then obtains the third User ID and globally unique identifier in the second antitheft verifying message, verifies third User ID pair Whether the user answered is legitimate user.If legitimate user, then CDN node is triggered to client feedback data resource.
It should be noted that preventing when global buffer system often receives once corresponding with the globally unique identifier first When stealing verifying message, the primary verifying record corresponding with the first antitheft verifying message of record.When often receive it is primary with it is global When the corresponding second antitheft verifying message of unique identifier, re-records once verifying corresponding with the second antitheft verifying message and remember Record.It prevents there are illegal users from carrying out robber's chain using illegal means, and utilizes ill-gotten resource address request repeatedly Data resource.
It is that the first User ID distribution one is globally unique by global buffer system using method provided in an embodiment of the present invention Identifier uses second in the first antitheft verifying message when the receive scheduler dispatches first antitheft verifying message Family ID and globally unique identifier are verified, to ensure that current request obtains the user of resource address as legitimate user.When connecing When receiving the second antitheft verifying message of CDN node transmission, to the third User ID and the overall situation in the second antitheft verifying message Unique identifier is verified, to ensure the user of current request downloading data resource for legitimate user.Antitheft by first After verifying the corresponding verification process of message and the corresponding verification process of the second antitheft verifying message, data resource could be obtained, Prevent illegal user's analog subscriber ID from stealing resource address, or after stealing resource address by illegal means, according to resource Location obtains data resource from the corresponding CDN node of resource supplier, and the band of resource supplier is caused after avoiding illegal user from stealing chain Wide loss, so that resource supplier pays high bandwidth expense because of robber's chain problem of illegal user.
It, optionally, will be complete when client is when to scheduler dispatches resource address requests in method provided by the invention Office's unique identifier, the first User ID and other information generate required parameter, and encrypt to the required parameter, the encryption Encryption Algorithm can use xxtea Encryption Algorithm, obtain CIPHERING REQUEST parameter, and call pre-set base64 volume Code, to this, CIPHERING REQUEST parameter has been encoded, obtains encrypted characters string.The encrypted characters string is encapsulated to the resource address and is asked In asking, prevents client into scheduler dispatches resource request process, the use in resource address requests is stolen by illegal user Family ID.
Further, scheduler obtains in resource address requests after the resource address requests for receiving client transmission Encrypted characters string Gray code is carried out to the encrypted characters string and is solved and with pre-set Gray code technology and decipherment algorithm It is close, the second user ID in the encrypted characters string is obtained with globally unique identifier.
Further illustrate, scheduler also carries out encryption meter to the resource address when for client feedback resource address It calculates and encodes.Equally, client is when sending resource download request to CDN node, also to globally unique identifier, the first user ID, resource address and other information carry out computations and coding.
It should be noted that since communication connection having been established between client, scheduler and CDN node, client When end, scheduler and CDN node carry out data transmission, the cipher mode of agreement and coding mode can be used to carry out data transmission. That is, using xxtea Encryption Algorithm and base64 coding techniques to resource address requests, resource download request and resource address etc. Carry out encrypted transmission.
In method provided in an embodiment of the present invention, client to scheduler dispatches resource address requests, scheduler to When client sends resource address and client and sends resource download request to CDN node, all can to request process each time and The process of feedback carries out computations and coding.To guarantee during communication by illegal user with stealing User ID, resource The parameter informations such as location largely prevent illegal user from carrying out robber's chain.
In method provided in an embodiment of the present invention, it is based on above-mentioned steps S102, when the identifier for receiving client transmission After distribution request, the first User ID for including in the identifier distribution request is obtained, and generate by pre-set identifier Algorithm generates globally unique identifier corresponding with the first User ID, specifically includes:
It determines the current request time when client sends the identifier distribution request, and obtains the client Corresponding equipment identification information;
According to pre-set identifier generating algorithm, to the current request time, the equipment identification information and institute It states the first User ID to be calculated, generates globally unique identifier corresponding with first User ID.
In anti-stealing link method provided in an embodiment of the present invention, after getting the first User ID, determine the client to this Global buffer system sends current request time when identifier distribution request.Meanwhile it obtaining the corresponding terminal of the client and setting Standby equipment identification information.By identifier generating algorithm, when calculating the first User ID, equipment identification information and current request Between, generate globally unique identifier.That is, when user needs to obtain data resource within the current request time, then according to current The User ID of request time, the equipment identification information of the corresponding equipment of client used by a user and the user generates one Globally unique identifier.To guarantee during entirely obtaining data resource, according to the globally unique identifier, it is determined whether There are illegal users to carry out robber's chain.
It should be noted that the globally unique identifier is a unique identifier in the overall situation.In addition to the first User ID, Equipment identification information and except the current request time can also carry out calculating generation, such as resource letter by other data parameters The other informations such as breath, age of user.The globally unique identifier is made of 32 16 systems.Each User ID is in current request A globally unique identifier is only existed under time, current device.But the corresponding globally unique identifier of the first User ID is not It can be unalterable.When each request data resource of user, can all User ID be given to distribute a new globally unique identifier.
It is raw according to current request time, equipment identification information, the first User ID using method provided in an embodiment of the present invention At globally unique identifier, guarantee the uniqueness of the identifier, so that illegal user can not carry out the globally unique identifier It cracks, and can effectively recognize whether that illegal user carries out robber's chain according to the globally unique identifier, avoid resource confession Answer the bandwidth loss of quotient.
In method provided in an embodiment of the present invention, it is based on above-mentioned steps S103, when get scheduler dispatches first anti- After stealing verifying message, according to globally unique identifier verify the corresponding user of second user ID whether be the process of legitimate user such as Shown in Fig. 2, specifically include:
S201: the first User ID corresponding with the globally unique identifier is obtained;
In embodiments of the present invention, global buffer system has been protected when distributing globally unique identifier to the first User ID Deposit first User ID.It, can be according to the globally unique identifier again when global buffer system receives globally unique identifier It is secondary to obtain the first User ID pre-saved.
S202: first User ID is matched with the second user ID, verifies first User ID and institute Whether consistent state second user ID;
In embodiments of the present invention, the first User ID is matched with second user ID, is determined received by scheduler Resource address requests whether be the resource address for carrying first User ID and globally unique identifier that the client is sent Request.
S203: when first User ID is consistent with the second user ID, judgement is asked with the described first antitheft verifying Ask whether corresponding verifying number is more than pre-set first verification threshold;
In the present invention is implemented, it if the first User ID is consistent with second user ID, can determine received by scheduler Resource address requests be resource address requests for carrying first User ID and globally unique identifier that the client is sent, At this time again by determining verifying number corresponding with the first antitheft checking request, to judge whether the verifying number is more than to set in advance The first verification threshold set.That is, the global buffer system verifies the requests verification number of the first antitheft checking request.
S204: when the verifying number corresponding with the described first antitheft checking request is less than first verification threshold When, determine that the corresponding user of the second user ID is legitimate user;
In embodiments of the present invention, when verifying number is less than the first verification threshold, determine that second user ID is corresponding User be legitimate user, such as the first verification threshold be 2, if the verifying number of the first antitheft checking request be no more than twice, Then think that the corresponding user of second user ID is legitimate user.
S205: when the verifying number corresponding with the described first antitheft checking request is more than first verification threshold When, determine that the corresponding user of the second user ID is illegal user.
In embodiments of the present invention, if verifying number is more than the first verification threshold, prove that there may be other illegal use Family carries out the case where multiple request data resource, therefore assert that the corresponding user of second user ID is illegal user.
In method provided in an embodiment of the present invention, when determining the corresponding user of second user ID is illegal user, also wrap It includes:
S206: when the corresponding user of the second user ID is illegal user, determine that the second user ID is corresponding The user non-same user of user corresponding with first User ID, and trigger the scheduler interrupts and sent to the client Resource address corresponding with the resource address requests.
In embodiments of the present invention, however, it is determined that there are when illegal user's request resource address, can determine that there are non- Method user utilizes the resource address of illegal means request resource supplier.At this point, global buffer system will trigger scheduler It interrupts to a side of request resource address and sends resource address.Optionally, which produces first and interrupts Instruction, and to scheduler dispatches first interrupt instruction, so that scheduler interrupts resource address corresponding with second user ID Request.
In anti-stealing link method provided in an embodiment of the present invention, first verifies second user ID and whether the first User ID is consistent; If it is consistent, then judge whether the verifying number of the first antitheft checking request has been more than the first verification threshold.If not exceeded, then really The fixed corresponding user of second user ID is legitimate user.If being more than, it is determined that the corresponding user of second user ID is illegal User.As the illegal user of the corresponding user of second user ID, scheduler will not be according to resource address requests to client Feedback resources address.
Optionally, when global buffer system receives the first antitheft verifying message of scheduler dispatches, first determine this The second user ID and globally unique identifier for carrying out the first antitheft verifying whether are contained in one antitheft verifying message.If packet Contain, then obtains the second user ID and globally unique identifier in the first antitheft verifying message.If not including the second user ID and globally unique identifier then no longer need to carry out the first antitheft verifying, and there is currently illegal users for determination with stealing resource Location, and trigger scheduler interrupts and provide resource address to client.
Further, when containing second user ID and globally unique identifier, but second in the first antitheft verifying message When User ID and the first User ID are inconsistent, determine that second user ID and the globally unique identifier mismatch, and this second The corresponding user of User ID is illegal user.At this point, whether no longer needing to judge to verify number more than the first verification threshold.
It should be noted that illegal user can be and non-by analogue data interface to scheduler dispatches resource address requests After method user gets resource address, request data resource can be repeated according to the resource address.But it is same globally unique The number for the request resource address that identifier allows is limited, even if being to close by the corresponding user of verifying second user ID Method, but when the corresponding verifying number of the first antitheft verifying message is more than pre-set first verification threshold, equally also think to deposit Resource address is stolen in illegal user.
Using method provided in an embodiment of the present invention, by the verifying to second user ID and the judgement to verifying number, To determine whether the corresponding user of second user ID of request resource address is legitimate user, prevents illegal user from getting After resource address, data resource is obtained from the corresponding CDN node of resource supplier according to the resource address, and then avoid band Wide loss.
In method provided in an embodiment of the present invention, it is based on above-mentioned steps S105, when get CDN node transmission second anti- After stealing verifying message, according to globally unique identifier, verify the corresponding user of third User ID whether be legitimate user process As shown in figure 3, specifically including:
S301: the first User ID corresponding with the globally unique identifier is obtained;
It in embodiments of the present invention, can when global buffer system receives the globally unique identifier of CDN node transmission Obtain the first User ID pre-saved again according to the globally unique identifier.
S302: first User ID is matched with the third User ID, verifies first User ID and institute Whether consistent state third User ID;
In embodiments of the present invention, the first User ID is matched with third User ID, is determined received by CDN node Resource download request whether be carrying the first User ID, globally unique identifier and resource address that the client is sent Resource download request.
S303: when first User ID is consistent with the third User ID, judgement is asked with the described second antitheft verifying Ask whether corresponding verifying number is more than pre-set second verification threshold;
In the present invention is implemented, it if the first User ID is consistent with third User ID, can determine received by CDN node Resource download request be the client send carrying first User ID, globally unique identifier and resource address resource Downloading request, at this time again by determining verifying number corresponding with the second antitheft checking request, whether to judge the verifying number More than pre-set second verification threshold.That is, requests verification time of the global buffer system to the second antitheft checking request Number is verified.
S304: when the verifying number corresponding with the described second antitheft checking request is less than second verification threshold When, determine that the corresponding user of the third User ID is legitimate user;
In embodiments of the present invention, in order to after further preventing illegal user to steal chain success by the resource of resource supplier Address obtains data resource, verifying verifying number corresponding with the second antitheft verifying message, after illegal user's robber's chain Data resource is obtained from the corresponding CDN node of resource supplier repeatedly.When verifying number is less than the second verification threshold, determine The corresponding user of the third User ID be legitimate user, such as the second verification threshold be 3 when, if the second antitheft checking request is tested It demonstrate,proves number to be no more than three times, then it is assumed that the corresponding user of the third User ID is legitimate user.
S305: when the verifying number corresponding with the described second antitheft checking request is more than second verification threshold When, determine that the corresponding user of the third User ID is illegal user.
In embodiments of the present invention, if verifying number is more than the second verification threshold, prove that there may be other illegal use Family carries out the case where repeatedly request downloading data resource, therefore assert that the corresponding user of the third User ID is illegal user.
In method provided in an embodiment of the present invention, when determining the corresponding user of third User ID is illegal user, specifically Further include:
S306: when the corresponding user of the third User ID is illegal user, determine that the third User ID is corresponding The user non-same user of user corresponding with first User ID, and trigger the CDN node and interrupt to client hair Send resource address corresponding with the resource download request.
In embodiments of the present invention, however, it is determined that when requesting downloading data resource there are illegal user, triggering CDN node is interrupted Data resource is sent to client.Optionally, which produces the second interrupt instruction, and sends to CDN node Second interrupt instruction, so that the CDN node interrupts resource download request corresponding with third User ID.
In anti-stealing link method provided in an embodiment of the present invention, first verifies third User ID and whether the first User ID is consistent; If it is consistent, then judge whether the verifying number of the second antitheft checking request has been more than the second verification threshold.If not exceeded, then really The fixed corresponding user of the third User ID is legitimate user.If being more than, it is determined that the corresponding user of the third User ID is illegal User.When third User ID and the first User ID are inconsistent, it may be determined that the corresponding user of the third User ID is illegal user. At this point, whether no longer needing to judge to verify number more than the second verification threshold.When the corresponding user of the third User ID is illegal uses When family, CDN node will not send data resource to client, and interrupt the process of the data resource downloading between client.
Optionally, when global buffer system receives the second antitheft verifying message of CDN node transmission, first determine this Third User ID and globally unique identifier whether are contained in two antitheft verifying message.If comprising it is second antitheft to obtain this Verify the third User ID and globally unique identifier in message.If not including the third User ID and globally unique identifier, Then no longer need to carry out the verification process of the second antitheft verifying, determine there is currently illegal user pass through the resource address stolen from The corresponding CDN node of resource supplier obtains data resource.
It should be noted that CDN node, when receiving resource download request, which may be by illegal User is by analogue data interface, scheduler interface, or the mode of resource download request is directly sent to CDN node, asks Seek CDN node downloading data resource.Therefore, the second antitheft verifying for verifying CDN node transmission in the embodiment of the present invention again disappears Breath obtains the data resource of CDN node to determine whether there is illegal user by stealing chain.Meanwhile by judging that second is antitheft The verifying number for verifying message, the resource address for further preventing illegal user to iterate through resource supplier obtain data money The loss of bandwidth is caused in source.
Using method provided in an embodiment of the present invention, when CDN node receives request downloading data resource, global buffer System passes through the verification process of the second antitheft verifying, prevents illegal user from simulating legitimate user by way of stealing chain illegally from money The corresponding CDN node of source supplier obtains data resource, causes the loss of bandwidth.
The method provided based on the above embodiment, even if illegal user passes through the above-mentioned first antitheft verifying message corresponding It, still can not cache resources after one antitheft verification process and the corresponding second antitheft verification process of the second antitheft verifying message Location, it is necessary to every time in accordance with the request process of legitimate user in above-described embodiment step S101~S106, so that illegal user carries out Chain cost is stolen to increase significantly.Simultaneously because the links in the embodiment of the present invention can not be got around, it is identified the probability for stealing chain Also it greatly increases.The specific implementation process and its deriving mode of above-mentioned each embodiment, it is within the scope of the present invention.
Corresponding with method described in Fig. 1, the embodiment of the invention also provides a kind of antitheft chain apparatus, for in Fig. 1 The specific implementation of method, antitheft chain apparatus provided in an embodiment of the present invention can be with application computer terminal or various mobile devices In, structural schematic diagram is as shown in figure 4, specifically include:
Acquiring unit 401, for obtaining the identifier point when receiving the identifier distribution request of client transmission With the first User ID for including in request;
Generation unit 402, for generating corresponding with first User ID according to pre-set identifier generating algorithm Globally unique identifier, and the globally unique identifier is sent to the client, triggers the client to preparatory The scheduler dispatches of setting carry the resource address requests of the globally unique identifier and first User ID;
First authentication unit 403, first sent for the scheduler ought to be received according to the resource address requests When antitheft verifying message, the second user ID for including in the described first antitheft verifying message and the globally unique identifier are obtained Symbol, and according to the globally unique identifier, verify whether the corresponding user of the second user ID is legitimate user;
First trigger unit 404, for determining described the when the corresponding user of the second user ID is legitimate user The corresponding user of two User ID user corresponding with first User ID is same user, and triggers the scheduler to described Client sends corresponding with resource address requests resource address, so that the client is to pre-set content distribution Network C DN node sends the resource download request for carrying the resource address, the first User ID and globally unique identifier;
Second authentication unit 405, second sent for the CDN node ought to be received according to the resource download request When antitheft verifying message, the third User ID for including in the described second antitheft verifying message and the globally unique identifier are obtained Symbol, and according to the globally unique identifier, verify whether the corresponding user of the third User ID is legitimate user;
Second trigger unit 406, for determining described the when the corresponding user of the third User ID is legitimate user The corresponding user of three User ID user corresponding with first User ID is same user, and triggers the CDN node to institute It states client and sends data resource.
In device provided in an embodiment of the present invention, the generation unit 402, comprising:
First obtains subelement, when current request when for determining that the client sends the identifier distribution request Between, and obtain the corresponding equipment identification information of the client;
Subelement is generated, for according to pre-set identifier generating algorithm, to the current request time, described is set Standby identification information and first User ID are calculated, and globally unique identifier corresponding with first User ID is generated.
In device provided in an embodiment of the present invention, first authentication unit 403, comprising:
Second obtains subelement, for obtaining the first User ID corresponding with the globally unique identifier;
First verifying subelement, for matching first User ID with the second user ID, described in verifying Whether the first User ID and the second user ID are consistent;
First judgment sub-unit, for when first User ID is consistent with the second user ID, judge with it is described Whether the corresponding verifying number of the first antitheft checking request is more than pre-set first verification threshold;
First determines subelement, for being less than institute when the verifying number corresponding with the described first antitheft checking request When stating the first verification threshold, determine that the corresponding user of the second user ID is legitimate user;
Second determines subelement, for when the verifying number corresponding with the described first antitheft checking request is more than described in When the first verification threshold, determine that the corresponding user of the second user ID is illegal user.
In device provided in an embodiment of the present invention, further includes:
First determination unit, for determining described second when the corresponding user of the second user ID is illegal user The corresponding user of the User ID non-same user of user corresponding with first User ID, and the scheduler interrupts are triggered to institute It states client and sends resource address corresponding with the resource address requests.
In device provided in an embodiment of the present invention, second authentication unit 405, comprising:
Third obtains subelement, for obtaining the first User ID corresponding with the globally unique identifier;
Second verifying subelement, for matching first User ID with the third User ID, described in verifying Whether the first User ID and the third User ID are consistent;
Second judgment sub-unit, for when first User ID is consistent with the third User ID, judge with it is described Whether the corresponding verifying number of the second antitheft checking request is more than pre-set second verification threshold;
Third determines subelement, for being less than institute when the verifying number corresponding with the described second antitheft checking request When stating the second verification threshold, determine that the corresponding user of the third User ID is legitimate user;
4th determines subelement, for when the verifying number corresponding with the described second antitheft checking request is more than described in When the second verification threshold, determine that the corresponding user of the third User ID is illegal user.
In device provided in an embodiment of the present invention, further includes:
Second determination unit, for determining the third when the corresponding user of the third User ID is illegal user The corresponding user of the User ID non-same user of user corresponding with first User ID, and trigger the CDN node interrupt to The client sends resource address corresponding with the resource download request.
Acquiring unit 401, generation unit 402, first in the above antitheft chain apparatus disclosed by the embodiments of the present invention are verified The specific work process of unit 403, the first trigger unit 404, the second authentication unit 405 and the second trigger unit 406, reference can be made to Corresponding content in anti-stealing link method disclosed in the above embodiment of the present invention, is not discussed here.
The embodiment of the invention also provides a kind of storage medium, the storage medium includes the instruction of storage, wherein in institute It states the equipment where controlling the storage medium when instruction operation and executes above-mentioned anti-stealing link method.
The embodiment of the invention also provides a kind of electronic equipment, structural schematic diagram is as shown in figure 5, specifically include memory 501 and one perhaps more than one 502 one of them or more than one instruction of instruction 502 be stored in memory 501 In, and be configured to by one or more than one processor 503 execute the one or more instruction 502 carry out with Lower operation:
When receiving the identifier distribution request of client transmission, include in the identifier distribution request the is obtained One User ID;
According to pre-set identifier generating algorithm, globally unique identifier corresponding with first User ID is generated Symbol, and the globally unique identifier is sent to the client, it triggers the client and is sent out to pre-set scheduler Send the resource address requests for carrying the globally unique identifier and first User ID;
When receiving the first antitheft verifying message that the scheduler is sent according to the resource address requests, institute is obtained The second user ID for including in the first antitheft verifying message and the globally unique identifier are stated, and according to the globally unique mark Know symbol, verifies whether the corresponding user of the second user ID is legitimate user;
When the corresponding user of the second user ID be legitimate user when, determine the corresponding user of the second user ID with The corresponding user of first User ID is same user, and triggers the scheduler and send and the resource to the client The corresponding resource address of Address requests carries so that the client is sent to pre-set content distributing network CDN node The resource download request of the resource address, the first User ID and globally unique identifier;
When receiving the second antitheft verifying message that the CDN node is sent according to the resource download request, obtain The third User ID and the globally unique identifier for including in the second antitheft verifying message, and according to described globally unique Identifier, verifies whether the corresponding user of the third User ID is legitimate user;
When the corresponding user of the third User ID be legitimate user when, determine the corresponding user of the third User ID with The corresponding user of first User ID is same user, and triggers the CDN node and send and the money to the client Corresponding data resource is requested in source downloading.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system or For system embodiment, since it is substantially similar to the method embodiment, so describing fairly simple, related place is referring to method The part of embodiment illustrates.System and system embodiment described above is only schematical, wherein the conduct The unit of separate part description may or may not be physically separated, component shown as a unit can be or Person may not be physical unit, it can and it is in one place, or may be distributed over multiple network units.It can root According to actual need that some or all of the modules therein is selected to achieve the purpose of the solution of this embodiment.Ordinary skill Personnel can understand and implement without creative efforts.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, it can be realized with electronic hardware, computer software, or a combination of the two,
In order to clearly illustrate the interchangeability of hardware and software, it is generally retouched according to function in the above description Each exemplary composition and step are stated.These functions are implemented in hardware or software actually, depending on technical solution Specific application and design constraint.Professional technician can to each specific application come using distinct methods to realize The function of description, but such implementation should not be considered as beyond the scope of the present invention.
The foregoing description of the disclosed embodiments enables those skilled in the art to implement or use the present invention. Various modifications to these embodiments will be readily apparent to those skilled in the art, as defined herein General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, of the invention It is not intended to be limited to the embodiments shown herein, and is to fit to and the principles and novel features disclosed herein phase one The widest scope of cause.

Claims (10)

1. a kind of anti-stealing link method characterized by comprising
When receiving the identifier distribution request of client transmission, obtains include in the identifier distribution request first and use Family ID;
According to pre-set identifier generating algorithm, globally unique identifier corresponding with first User ID is generated, and The globally unique identifier is sent to the client, the client is triggered and is carried to pre-set scheduler dispatches The resource address requests of the globally unique identifier and first User ID;
When receiving the first antitheft verifying message that the scheduler is sent according to the resource address requests, described the is obtained The second user ID for including in one antitheft verifying message and the globally unique identifier, and according to the globally unique identifier Symbol, verifies whether the corresponding user of the second user ID is legitimate user;
When the corresponding user of the second user ID be legitimate user when, determine the corresponding user of the second user ID with it is described The corresponding user of first User ID is same user, and triggers the scheduler and send and the resource address to the client Corresponding resource address is requested, so that the client is sent described in carrying to pre-set content distributing network CDN node The resource download request of resource address, the first User ID and globally unique identifier;
When receiving the second antitheft verifying message that the CDN node is sent according to the resource download request, described in acquisition The third User ID and the globally unique identifier for including in second antitheft verifying message, and according to the globally unique identifier Symbol, verifies whether the corresponding user of the third User ID is legitimate user;
When the corresponding user of the third User ID be legitimate user when, determine the corresponding user of the third User ID with it is described The corresponding user of first User ID is same user, and is triggered under the CDN node sends to the client with the resource It carries and requests corresponding data resource.
2. the method according to claim 1, wherein described according to pre-set identifier generating algorithm, life At globally unique identifier corresponding with first User ID, comprising:
Determine the current request time when client sends the identifier distribution request, and it is corresponding to obtain the client Equipment identification information;
According to pre-set identifier generating algorithm, to the current request time, the equipment identification information and described One User ID is calculated, and globally unique identifier corresponding with first User ID is generated.
3. the method according to claim 1, wherein described according to the globally unique identifier, described in verifying Whether the corresponding user of second user ID is legitimate user, comprising:
Obtain the first User ID corresponding with the globally unique identifier;
First User ID is matched with the second user ID, verifies first User ID and the second user Whether ID is consistent;
When first User ID is consistent with the second user ID, test corresponding with the described first antitheft checking request is judged Demonstrate,prove whether number is more than pre-set first verification threshold;
When the verifying number corresponding with the described first antitheft checking request is less than first verification threshold, institute is determined Stating the corresponding user of second user ID is legitimate user;
When the verifying number corresponding with the described first antitheft checking request is more than first verification threshold, determine described in The corresponding user of second user ID is illegal user.
4. method according to claim 1 or 3, which is characterized in that further include:
When the corresponding user of the second user ID be illegal user when, determine the corresponding user of the second user ID with it is described The non-same user of the corresponding user of first User ID, and trigger the scheduler interrupts and sent and the resource to the client The corresponding resource address of Address requests.
5. the method according to claim 1, wherein described according to the globally unique identifier, described in verifying Whether the corresponding user of third User ID is legitimate user, comprising:
Obtain the first User ID corresponding with the globally unique identifier;
First User ID is matched with the third User ID, verifies first User ID and the third user Whether ID is consistent;
When first User ID is consistent with the third User ID, test corresponding with the described second antitheft checking request is judged Demonstrate,prove whether number is more than pre-set second verification threshold;
When the verifying number corresponding with the described second antitheft checking request is less than second verification threshold, institute is determined Stating the corresponding user of third User ID is legitimate user;
When the verifying number corresponding with the described second antitheft checking request is more than second verification threshold, determine described in The corresponding user of third User ID is illegal user.
6. method according to claim 1 or 5, which is characterized in that further include:
When the corresponding user of the third User ID be illegal user when, determine the corresponding user of the third User ID with it is described The non-same user of the corresponding user of first User ID, and trigger the CDN node and interrupt to client transmission and the money Corresponding resource address is requested in source downloading.
7. a kind of antitheft chain apparatus characterized by comprising
Acquiring unit, for obtaining the identifier distribution request when receiving the identifier distribution request of client transmission In include the first User ID;
Generation unit, for generating the overall situation corresponding with first User ID according to pre-set identifier generating algorithm Unique identifier, and the globally unique identifier is sent to the client triggers the client to pre-set Scheduler dispatches carry the resource address requests of the globally unique identifier and first User ID;
First authentication unit, for working as the first antitheft verifying for receiving the scheduler and sending according to the resource address requests When message, the second user ID for including in the described first antitheft verifying message and the globally unique identifier, and foundation are obtained The globally unique identifier, verifies whether the corresponding user of the second user ID is legitimate user;
First trigger unit, for determining the second user when the corresponding user of the second user ID is legitimate user The corresponding user of ID user corresponding with first User ID is same user, and triggers the scheduler to the client Corresponding with resource address requests resource address is sent, so that the client is to pre-set content distributing network CDN node sends the resource download request for carrying the resource address, the first User ID and globally unique identifier;
Second authentication unit, for second antitheft being tested according to what the resource download request was sent when receiving the CDN node When demonstrate,proving message, the third User ID and the globally unique identifier for including in the antitheft verifying message of acquisition described second, and according to According to the globally unique identifier, verify whether the corresponding user of the third User ID is legitimate user;
Second trigger unit, for determining the third user when the corresponding user of the third User ID is legitimate user The corresponding user of ID user corresponding with first User ID is same user, and triggers the CDN node to the client End sends data resource.
8. device according to claim 7, which is characterized in that the generation unit, comprising:
First acquisition subelement, current request time when for determining that the client sends the identifier distribution request, And obtain the corresponding equipment identification information of the client;
Subelement is generated, is used for according to pre-set identifier generating algorithm, to the current request time, the equipment mark Know information and first User ID is calculated, generates globally unique identifier corresponding with first User ID.
9. device according to claim 7, which is characterized in that first authentication unit, comprising:
Second obtains subelement, for obtaining the first User ID corresponding with the globally unique identifier;
First verifying subelement, for first User ID to be matched with the second user ID, verifying described first Whether User ID and the second user ID are consistent;
First judgment sub-unit, for judging and described first when first User ID is consistent with the second user ID Whether the corresponding verifying number of antitheft checking request is more than pre-set first verification threshold;
First determines subelement, for being less than described the when the verifying number corresponding with the described first antitheft checking request When one verification threshold, determine that the corresponding user of the second user ID is legitimate user;
Second determines subelement, for being more than described first when the verifying number corresponding with the described first antitheft checking request When verification threshold, determine that the corresponding user of the second user ID is illegal user.
10. device according to claim 7, which is characterized in that second authentication unit, comprising:
Third obtains subelement, for obtaining the first User ID corresponding with the globally unique identifier;
Second verifying subelement, for first User ID to be matched with the third User ID, verifying described first Whether User ID and the third User ID are consistent;
Second judgment sub-unit, for judging and described second when first User ID is consistent with the third User ID Whether the corresponding verifying number of antitheft checking request is more than pre-set second verification threshold;
Third determines subelement, for being less than described the when the verifying number corresponding with the described second antitheft checking request When two verification thresholds, determine that the corresponding user of the third User ID is legitimate user;
4th determines subelement, for being more than described second when the verifying number corresponding with the described second antitheft checking request When verification threshold, determine that the corresponding user of the third User ID is illegal user.
CN201910655794.8A 2019-07-19 2019-07-19 Anti-stealing-link method and device Active CN110365688B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910655794.8A CN110365688B (en) 2019-07-19 2019-07-19 Anti-stealing-link method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910655794.8A CN110365688B (en) 2019-07-19 2019-07-19 Anti-stealing-link method and device

Publications (2)

Publication Number Publication Date
CN110365688A true CN110365688A (en) 2019-10-22
CN110365688B CN110365688B (en) 2022-06-07

Family

ID=68220900

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910655794.8A Active CN110365688B (en) 2019-07-19 2019-07-19 Anti-stealing-link method and device

Country Status (1)

Country Link
CN (1) CN110365688B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110765136A (en) * 2019-10-30 2020-02-07 泰康保险集团股份有限公司 Identifier management method, device, medium and equipment
CN112689164A (en) * 2020-12-17 2021-04-20 杭州当虹科技股份有限公司 CDN-based video anti-theft chain system
WO2023093772A1 (en) * 2021-11-24 2023-06-01 贵州白山云科技股份有限公司 Request scheduling method and apparatus, electronic device, and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104811438A (en) * 2015-03-26 2015-07-29 网宿科技股份有限公司 Asynchronous hotlink protection method and system based on scheduling system
US20160021224A1 (en) * 2003-11-12 2016-01-21 Wayne Richard Howe Stealth Packet Communications
CN105827673A (en) * 2015-01-05 2016-08-03 中国移动通信集团浙江有限公司 Link theft preventing method, link theft preventing device, and network server
US20170163642A1 (en) * 2015-12-07 2017-06-08 Le Holdings (Beijing) Co., Ltd. Method, Electronic Device and System for Content Pushing
CN107241293A (en) * 2016-03-28 2017-10-10 杭州萤石网络有限公司 A kind of resource access method, apparatus and system
CN109413000A (en) * 2017-08-15 2019-03-01 吴波 A kind of anti-stealing link method and door chain gateway system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160021224A1 (en) * 2003-11-12 2016-01-21 Wayne Richard Howe Stealth Packet Communications
CN105827673A (en) * 2015-01-05 2016-08-03 中国移动通信集团浙江有限公司 Link theft preventing method, link theft preventing device, and network server
CN104811438A (en) * 2015-03-26 2015-07-29 网宿科技股份有限公司 Asynchronous hotlink protection method and system based on scheduling system
US20170163642A1 (en) * 2015-12-07 2017-06-08 Le Holdings (Beijing) Co., Ltd. Method, Electronic Device and System for Content Pushing
CN107241293A (en) * 2016-03-28 2017-10-10 杭州萤石网络有限公司 A kind of resource access method, apparatus and system
CN109413000A (en) * 2017-08-15 2019-03-01 吴波 A kind of anti-stealing link method and door chain gateway system

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110765136A (en) * 2019-10-30 2020-02-07 泰康保险集团股份有限公司 Identifier management method, device, medium and equipment
CN112689164A (en) * 2020-12-17 2021-04-20 杭州当虹科技股份有限公司 CDN-based video anti-theft chain system
CN112689164B (en) * 2020-12-17 2022-06-28 杭州当虹科技股份有限公司 CDN-based video anti-theft chain system
WO2023093772A1 (en) * 2021-11-24 2023-06-01 贵州白山云科技股份有限公司 Request scheduling method and apparatus, electronic device, and storage medium

Also Published As

Publication number Publication date
CN110365688B (en) 2022-06-07

Similar Documents

Publication Publication Date Title
CN106453330B (en) A kind of identity authentication method and system
CN106899410B (en) A kind of method and device of equipment identities certification
CN105306534B (en) A kind of information calibration method and open platform based on open platform
CN108537046A (en) A kind of online contract signature system and method based on block chain technology
CN110365688A (en) Anti-stealing link method and device
CN103067174B (en) Digital signature method and system completed in mobile operating system
CN104639562A (en) Work method of authentication pushing system and equipment
CN105608369B (en) The installation method and device of application software
US20080288778A1 (en) Method for Generating and Verifying an Electronic Signature
CN101183932A (en) Security identification system of wireless application service and login and entry method thereof
CN103095457A (en) Login and verification method for application program
CN106230838A (en) A kind of third-party application accesses the method and apparatus of resource
CN108322416B (en) Security authentication implementation method, device and system
CN105447715A (en) Method and apparatus for anti-theft electronic coupon sweeping by cooperating with third party
CN104753674A (en) Application identity authentication method and device
CN108449315A (en) Ask calibration equipment, method and the computer readable storage medium of legitimacy
CN105519028A (en) Wireless system access control method and apparatus
CN110677399B (en) Authentication method and device
CN110944228A (en) Video stream protection method, device and storage medium
CN108566374A (en) A kind of application method for down loading and its system, block chain node device, terminal
CN108718323A (en) A kind of identity identifying method and system
CN110099031A (en) A kind of service calling method, device and micro services platform
CN105119716A (en) Secret key negotiation method based on SD cards
CN104253787A (en) Service authentication method and system
CN102984335A (en) Identity authentication method, equipment and system for making fixed-line call

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant