Hotlink protection system and method on basis of HASH technology
An anti-leeching technology technology, applied in the field of Internet security, can solve problems such as misjudgment as hotlinking, failure to meet the needs of anti-hotlinking, and affecting normal access and interaction of second-level domain name websites, so as to achieve high feasibility and reduce hotlinking the possible effect of
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] figure 1 It is a structural block diagram of an embodiment of an anti-leeching system based on HASH technology of the present invention, as figure 1 Shown, the anti-leech system based on HASH technology among the present invention comprises:
[0037] a generating unit, configured to generate a corresponding first HASH value according to the characteristic information of the visitor;
[0038] An appending unit, configured to append the first HASH value generated by the generating unit to the link of the corresponding page in the form of a parameter;
[0039] The screening unit is used to determine whether the request of the visitor includes a HASH value parameter, and the HASH value parameter is generated according to the unique characteristic information of the visitor who made the new request; if so, the HASH value parameter is filtered out as the second HASH value and Go to the next step; if none, the server rejects the visitor's request and turns to an error page...
Embodiment 2
[0050] image 3 It is a flowchart of an embodiment of an anti-leeching method based on HASH technology with a time limit and a verification unit of the present invention, as image 3 As shown, a time limit and verification unit is set before the screening unit to determine whether the visitor's request exceeds the access time limit or whether the verification code carried by the visitor's request is correct before judging the HASH value. Its operation process is as follows:
[0051] When a visitor visits the website for the first time, the server extracts the characteristic information of the visitor;
[0052] generating a corresponding first HASH value according to the characteristic information of the visitor extracted by the server;
[0053] Appending the generated first HASH value in the form of a parameter to the link requested by the visitor;
[0054] After the visitor makes an access request, first judge whether the visitor's request exceeds the access time limit or ...
Embodiment 3
[0059] Figure 4 It is a flowchart of an embodiment of an anti-leech method based on HASH technology with a blacklist unit of the present invention, as Figure 4 As shown, the system further includes an independent blacklist unit and a retrieval unit. Wherein the blacklist unit is used to record the access channels of the visitors without HASH value parameters screened out by the screening unit, and the access channels of the visitors whose second HASH value is inconsistent with the first HASH value judged by the judging unit, thereby Prevent other visitors from making subsequent visits through the same access channel. The retrieval unit is used to retrieve the characteristic information of the access channel and the visitor according to the blacklist unit, so as to judge whether the access request is in the blacklist. Its operation process is as follows:
[0060] When a visitor visits the website for the first time, the server extracts the characteristic information of the...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 