Check patentability & draft patents in minutes with Patsnap Eureka AI!

A link processing method and system

A processing method and a processing system technology, applied in the field of link processing and systems, can solve the problems of space and traffic theft, aggravating the server burden, unfairness of the website being stolen, and achieve the effect of preventing the hot link.

Inactive Publication Date: 2017-02-22
深圳市云帆世纪科技有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Obviously, this is unfair to the hotlinked website, not only the space and traffic are stolen, the legitimate interests are violated, but also the burden on the server is increased

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A link processing method and system
  • A link processing method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0010] The present invention will be further described in detail below through specific embodiments in conjunction with the accompanying drawings.

[0011] First, the embodiments of the present invention are briefly described. The embodiment of the present invention proposes a link processing method, including: the server receives an http request requesting access to the anti-leech file; obtains relevant information from the http request, and the relevant information includes time, user IP, and user MAC At least one, encrypt the obtained relevant information or the password preset on the server side or the combination of the two with the first method to generate a first key; determine the first key and the second key contained in the http request Whether the codes are consistent; if they are consistent, the requested data will be returned. Further, it may also include: after detecting the user’s request to access the anti-leech file, the website server processes the link addr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a chaining processing method and a chaining processing system. The method comprises the steps of a server-side receiving a hyper text transport protocol (HTTP) request for accessing an anti-stealing-link document; acquiring relevant information, comprising at least time, internet protocol (IP) of a user, or a multi-access computer (MAC) of the user, from the HTTP request; encrypting the acquired relevant information or a code preset by the server-side or the combination of the information and the code in a first method to generate a first key code; judging whether the first key code conforms to a second key code contained in the HTTP request; and returning requested data if the first key code conforms to the second key code. According to the method, the first key code is generated according to the preset first method, then, whether the second key code in the HTTP request for accessing the anti-stealing-link document is the same as the first key code is judged, the request can be confirmed to be a legal request only when the second key code is the same as the first key code, and the requested data are allowed to be acquired, thus, and therefore a user in a stealing-link can not access the document so that stealing-link is prevented from occurring.

Description

technical field [0001] The invention relates to a link processing method and system. Background technique [0002] When the server of a website does not actually have the content that users want to visit displayed on the website page, such as a certain picture, and the website connects the link of the picture to other websites, and directly submits the content on its own page with advertisements and benefits. End users provide this content. This phenomenon is called hotlinking. [0003] Hotlinking makes websites without any resources use the resources of other websites to display to browsing users, increasing their visits, and most browsing users are unaware of this. Obviously, this is unfair to hotlinked websites. Not only space and traffic are stolen, legal interests are violated, but also the burden on the server is increased. Contents of the invention [0004] The main technical problem to be solved by the present invention is to provide a link processing method and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06
Inventor 张克东王羲桀唐涛
Owner 深圳市云帆世纪科技有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More