Link-stealing-prevention method and system for media files and server

A technology of media files and servers, applied in the field of communication, can solve problems such as exposure and difficult hotlinking

Active Publication Date: 2014-08-27
TCL CORPORATION
View PDF3 Cites 23 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The embodiment of the present invention provides a method for preventing hotlinking of media files, which aims to solve the problem that the existing method exposes the original URL address and is difficult to really prevent hotlinking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Link-stealing-prevention method and system for media files and server
  • Link-stealing-prevention method and system for media files and server
  • Link-stealing-prevention method and system for media files and server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] figure 1 Shows a flowchart of a method for preventing theft of media files provided by the first embodiment of the present invention. In this embodiment, the “first” in the “first server” and the “second” in the “second server” "Is only used to distinguish between different servers, and has no actual meaning such as sequence, etc. The details are as follows:

[0034] Step 11: The first server receives a login request sent by the terminal, where the login request carries a user name and a password.

[0035] In this step, the first server receives the http login request sent by the terminal. The http login request carries the user name and the password corresponding to the user name. Of course, the http login request may also carry information such as the identification code of the terminal.

[0036] Step 12: The first server obtains the external network IP address of the terminal according to the login request, and after verifying that the user name and password carried in the ...

Embodiment 2

[0066] figure 2 It shows a structural diagram of an anti-theft chaining system for media files provided by the second embodiment of the present invention. For ease of description, only the parts related to the embodiment of the present invention are shown.

[0067] The anti-theft chaining system for media files includes: a first server 21, a second server 22, and a terminal 23. The first server 21 includes a first login request receiving unit 211, a first username verification unit 212, a first original URL address obtaining unit 213, and a first original URL address encryption unit 214. The second server 22 includes an encrypted URL address access unit 221. An IP address matching unit 222 and an encrypted URL address decrypting unit 223.

[0068] among them:

[0069] The first login request receiving unit 211 is configured to receive a login request sent by the terminal, where the login request carries a user name and password.

[0070] The login request refers to an http login re...

Embodiment 3

[0096] image 3 It shows a structural diagram of a server provided by the third embodiment of the present invention. For ease of description, only the parts related to the embodiment of the present invention are shown.

[0097] The server includes: a second login request receiving unit 31, a second user name verification unit 32, a second original URL address obtaining unit 33, and a second original URL address encryption unit 34. among them:

[0098] The second login request receiving unit 31 is configured to receive a login request sent by the terminal, where the login request carries a user name and password.

[0099] The login request refers to an http login request sent by the terminal, and the http login request may also carry information such as the identification code of the terminal.

[0100] The second user name verification unit 32 is configured to obtain the external network IP address of the terminal according to the login request, and obtain the encryption key generated ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is suitable for the field of communications, and provides a link-stealing-prevention method and system for media files and a server. The method comprises the steps that a first server receives a log-in request; an outer network IP address and an encryption key of a terminal are obtained and the outer network IP address, a user name and the encryption key of the terminal are sent to a database to be stored; a URL address obtaining request is received, an original URL address corresponding to the URL address obtaining request is inquired and the encryption key corresponding to the user name is inquired; the original URL address is encrypted and the encrypted URL address is sent to the terminal; a second server receives an encrypted URL address access request; an outer network IP address of the terminal is obtained and the outer network IP address and the user name of the terminal are matched with the outer network IP address and the user name, stored in the database, of the terminal; after matching successes, the second server decrypts the encrypted URL address and the original URL address is obtained so that the terminal can have access to the original URL address. The link-stealing-prevention method and system can improve URL security.

Description

Technical field [0001] The invention belongs to the field of communications, and in particular relates to a method, system and server for preventing theft of media files. Background technique [0002] With the development of multimedia technology and network technology, the problem of hotlinking is becoming more and more serious, especially video hotlinking. The cost of making a video is usually high, and the hotlinking of the video will bring huge losses to the company that provides the video. [0003] In the existing anti-theft chaining method for media files, the portal website provides the URL encryption function, so that the user cannot open the corresponding resource according to the general network link, which has a better anti-theft chaining effect. However, the existing methods are not highly secure. For example, additional fields are directly added after the original URL to form a new access address, which still exposes the original URL address. The security is low and i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 吴艳春
Owner TCL CORPORATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products