Check patentability & draft patents in minutes with Patsnap Eureka AI!

A method of accessing third-party resources by jumping

A resource and jumping technology, applied in the field of communication, can solve the problems of inability to obtain user information, access to user information touches the law, etc., and achieve the effect of avoiding hotlinking

Active Publication Date: 2019-09-17
CHINA ACADEMY OF INFORMATION & COMM +1
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with this method is that certain information needs to be obtained from the client, and if the client has a high security level, the user’s information cannot be obtained, and obtaining the user’s information without the user’s knowledge may violate the law

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method of accessing third-party resources by jumping
  • A method of accessing third-party resources by jumping

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] In order to make the object, technical solution and advantages of the present invention clearer, the technical solution of the present invention will be described in detail below with reference to the accompanying drawings and examples.

[0020] The embodiment of the present application provides a method for accessing third-party resources in a jumping manner, which is applied to a server, and the relationship between servers that can be jumped is credible and difficult to forge.

[0021] In specific implementation, it is necessary to establish a trusted relationship between two servers that establish a trusted relationship. In specific implementation, the two servers negotiate to negotiate an encryption key, which is used for the calculation of the verification code.

[0022] The process of accessing third-party resources in a jump mode in the embodiment of the present application will be described in detail below in conjunction with the accompanying drawings.

[0023]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method for accessing a third party resource through redirecting manner. When a first server receives a request from a customer terminal and if the responding resource is located in a second server, a verification code is provided to the customer terminal and the resource path to access the second server is provided. When the second server receives the corresponding request sent from the customer terminal, calculations are made to the verification code according to the relevant information in the request; and the second server responds to corresponding resource only when the verification code carried in the request is identical to that sent by the second server. With the technical schemes of the invention, in case of accessing a third party resource, the user information does not have to be obtained. And the occurrence of website leeching can be avoided.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method for accessing third-party resources in a jumping manner. Background technique [0002] There are some websites on the Internet that do not provide content, bypass the certification of other websites through technical means, and directly provide end users with service content of other service providers on their own websites, defrauding end users of browsing and click-through rates. The beneficiaries do not provide resources or provide very few resources, but the real service providers do not get any benefits. [0003] Website hotlinking will consume a lot of bandwidth of the hotlinked website, but the real click rate may be very small, which seriously damages the interests of the hotlinked website. Early hotlinking is usually some relatively small websites stealing the addresses of some powerful large websites. The goal of hotlinking is more targeted. The common h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 刘述夏勇段世惠田辉
Owner CHINA ACADEMY OF INFORMATION & COMM
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More