Unlock instant, AI-driven research and patent intelligence for your innovation.

Hotlink protection system and method on basis of HASH technology

An anti-leeching technology technology, applied in the field of Internet security, can solve problems such as misjudgment as hotlinking, failure to meet the needs of anti-hotlinking, and affecting normal access and interaction of second-level domain name websites, so as to achieve high feasibility and reduce hotlinking the possible effect of

Inactive Publication Date: 2014-04-02
山东中创软件商用中间件股份有限公司
View PDF6 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] This method has certain advantages, but it has great limitations in actual operation: First, since the HTTP protocol is in plain text, hotlinkers can easily set the value of the referer header by technical means to make it consistent with the stolen Second, if there are multiple websites with different second-level domain names on the same web server, this method will affect the normal access interaction between the second-level domain name websites, resulting in incorrect access through the second-level domain name. hotlink
And because large websites have more excellent technical conditions and advantages, the existing anti-leech technology can no longer meet the anti-leech requirements in the actual use of the website, and it is imperative to provide a new anti-leech technology

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Hotlink protection system and method on basis of HASH technology
  • Hotlink protection system and method on basis of HASH technology
  • Hotlink protection system and method on basis of HASH technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] figure 1 It is a structural block diagram of an embodiment of an anti-leeching system based on HASH technology of the present invention, as figure 1 Shown, the anti-leech system based on HASH technology among the present invention comprises:

[0037] a generating unit, configured to generate a corresponding first HASH value according to the characteristic information of the visitor;

[0038] An appending unit, configured to append the first HASH value generated by the generating unit to the link of the corresponding page in the form of a parameter;

[0039] The screening unit is used to determine whether the request of the visitor includes a HASH value parameter, and the HASH value parameter is generated according to the unique characteristic information of the visitor who made the new request; if so, the HASH value parameter is filtered out as the second HASH value and Go to the next step; if none, the server rejects the visitor's request and turns to an error page...

Embodiment 2

[0050] image 3 It is a flowchart of an embodiment of an anti-leeching method based on HASH technology with a time limit and a verification unit of the present invention, as image 3 As shown, a time limit and verification unit is set before the screening unit to determine whether the visitor's request exceeds the access time limit or whether the verification code carried by the visitor's request is correct before judging the HASH value. Its operation process is as follows:

[0051] When a visitor visits the website for the first time, the server extracts the characteristic information of the visitor;

[0052] generating a corresponding first HASH value according to the characteristic information of the visitor extracted by the server;

[0053] Appending the generated first HASH value in the form of a parameter to the link requested by the visitor;

[0054] After the visitor makes an access request, first judge whether the visitor's request exceeds the access time limit or ...

Embodiment 3

[0059] Figure 4 It is a flowchart of an embodiment of an anti-leech method based on HASH technology with a blacklist unit of the present invention, as Figure 4 As shown, the system further includes an independent blacklist unit and a retrieval unit. Wherein the blacklist unit is used to record the access channels of the visitors without HASH value parameters screened out by the screening unit, and the access channels of the visitors whose second HASH value is inconsistent with the first HASH value judged by the judging unit, thereby Prevent other visitors from making subsequent visits through the same access channel. The retrieval unit is used to retrieve the characteristic information of the access channel and the visitor according to the blacklist unit, so as to judge whether the access request is in the blacklist. Its operation process is as follows:

[0060] When a visitor visits the website for the first time, the server extracts the characteristic information of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a hotlink protection system and a hotlink protection method on the basis of a HASH technology. A link address of a website is subjected to differentiation on the basis of the characteristics of a visitor by a HASH algorithm; by utilizing the characteristic that a HASH value is irregular and unpredictable, is generated unidirectionally and cannot be cracked, the HASH value generated on the basis of characteristic information of the visitor is added into a link which the visitor requests to access in a parameter mode and then hotlinking is judged according to the HASH value. The hotlink protection system and the hotlink protection method have the beneficial effects that the link requested by the visitor cannot be changed, the service logic of the website is not influenced and a convenient and rapid using effect is ensured; in principle, the hotlink protection system and the hotlink protection method solve the problem that when a plurality of visitors use the same agency to access the website, due to the same IP (Internet Protocol) of the visitors, the visitors cannot be distinguished. The hotlink protection system and the hotlink protection method have high feasibility; most websites can implement the hotlink protection system and the hotlink protection method by simple technologies such as a filter, and influence cannot be caused on original services of the websites.

Description

Technical field [0001] The invention involves the field of Internet security, especially a anti -theft chain system and method based on Hash technology. Background technique [0002] With the booming of the Internet, a large number of security issues have emerged, and the stolen chain is one of them.The stealing chain refers to the content that the service provider does not provide the service itself. Through technical means by bypassing other beneficial end -user interfaces (such as advertising), directly provides the service content of other service providers to the end user on your own website, and deceives the content of other service providers, deceived to obtain itEnd user's browsing and click -through rate.The beneficiaries do not provide resources or provide small resources, but the real service providers cannot get any benefits.The website theft chain will consume a large amount of bandwidth of the stolen chain website, while the real click rate brought to the stolen cha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/743
Inventor 王发鑫孙应娥张青高隆林
Owner 山东中创软件商用中间件股份有限公司