Unlock instant, AI-driven research and patent intelligence for your innovation.

Anti-stealing-link method, device and system

An anti-leeching and illegal technology, applied in the Internet field, can solve problems such as waste of resources, occupation of network access bandwidth, client cracking, etc., and achieve the effects of not being easy to be stolen, improving reliability, and accurate results

Inactive Publication Date: 2016-08-17
LETV CLOUD COMPUTING CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Hotlinking means that the services provided by the provider are illegally used or obtained by target users who are not the provider, thus affecting the interests of the provider
For example, a provider provides users with network access resources and the corresponding Uniform Resource Locator (UnifromResoure Locator, URL). Provide services to users outside the network, thereby occupying network access bandwidth, resulting in waste of resources, and even some users will expand and utilize the resources obtained, which affects the interests of providers
[0003] The current anti-leeching methods mainly include encrypted authentication methods. This method first obtains user information from the client, and then encrypts it into a character string according to the user information and the file information requested by the user as identity verification. Only when the user identity verification is successful, the server will The required files will be sent to the client, so as to achieve the purpose of anti-hotlinking. This method is equivalent to encrypting by adding a protocol algorithm to protect the client and server before the user logs in, but because the protocol algorithm involves user information when encrypting , it is easy to be cracked by illegal users on the client side, resulting in low reliability of this method for anti-hotlinking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anti-stealing-link method, device and system
  • Anti-stealing-link method, device and system
  • Anti-stealing-link method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0059] The embodiment of the present invention provides an anti-leech method, which can be applied to the client, such as figure 1 As shown, the method includes:

[0060] 101. When receiving a trigger operation for acquiring data information by a user, acquire behavior data of an application program operated by the user.

[0061] Wherein, the tr...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an anti-stealing-link method, device and system, relates to the technical field of communication and mainly aims at improving the anti-stealing-link reliability. The technical scheme used by the embodiment of the invention comprises following steps of obtaining behavior data of operating an application by a user when a triggering operation of the user for obtaining data information is received; sending an obtaining request of the user for obtaining the data information to a server, thus enabling the server to identify whether a current client is an illegal client or not according to the behavior data of operating the application by the user and the server preset behavior data of operating the application by the user, thus obtaining an identification result; receiving obtaining request response sent by the server, wherein the identification result is carried in the obtaining request response; and carrying out corresponding operations according to the identification result. The method, the device and the system are mainly used for anti-stealing-link.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of the Internet, and in particular to an anti-leeching method, device and system. Background technique [0002] Hotlinking means that the services provided by the provider are illegally used or obtained by target users who are not the provider, thereby affecting the provider's interests. For example, a provider provides users with network access resources and the corresponding Uniform Resource Locator (UnifromResoure Locator, URL). Other users provide services, thus occupying the network access bandwidth, resulting in a waste of resources, and some users will even expand and use the obtained resources, which affects the interests of the provider. [0003] The current anti-leeching methods mainly include encrypted authentication methods. This method first obtains user information from the client, and then encrypts it into a character string according to the user information and the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/1483H04L67/02
Inventor 赵瑞前李茗
Owner LETV CLOUD COMPUTING CO LTD