Link camouflage system and method

A technology for linking information and requesting parties, applied in transmission systems, electrical components, etc., can solve problems such as system drag and failure to meet expectations

Inactive Publication Date: 2017-06-09
PHICOMM (SHANGHAI) CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] While using the above-mentioned various security technical means, it may become the bottleneck of the system, especially in a

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Link camouflage system and method
  • Link camouflage system and method
  • Link camouflage system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] like figure 1 As shown, a link camouflage system includes a camouflage link generation unit, a camouflage database, a camouflage link parsing unit and a URL redirection unit. The fake link generating unit is used to convert the original link in the fake request into a corresponding fake link, store the mapping relationship between the original link and the fake link in the fake database and return the fake link to the requester.

[0039]The masquerading link generating unit receives and generates a request corresponding to the masquerading link sent by the requesting end. Specifically, the masquerading link generation unit includes a number distribution unit and a coding unit. There are two number allocation units, and each number allocation unit also includes a calculation unit. The initial number value of the number allocation unit A is 0, and the initial number value of the number allocation unit B is 1. For each camouflage link generation request, the number allo...

Embodiment 2

[0061] like image 3 As shown, a link camouflage system includes a camouflage link generation unit, a camouflage database, a camouflage link parsing unit and a URL redirection unit. The fake link generating unit is used to convert the original link in the fake request into a corresponding fake link, store the mapping relationship between the original link and the fake link in the fake database and return the fake link to the requester.

[0062] The masquerading link generating unit receives and generates a request corresponding to the masquerading link sent by the requesting end. Specifically, the masquerading link generation unit includes three number allocation units and encoding units corresponding to the three number allocation units respectively. There are three number allocation units, and each number allocation unit also includes a calculation unit. The initial number value of number allocation unit A is 0, the initial number value of number allocation unit B is 1, an...

Embodiment 3

[0084] like Figure 5 , a link camouflage system, comprising a camouflage link generation unit, a camouflage database, a camouflage link parsing unit and a URL redirection unit. The fake link generating unit is used to convert the original link in the fake request into a corresponding fake link, store the mapping relationship between the original link and the fake link in the fake database and return the fake link to the requester.

[0085] The masquerading link generating unit receives and generates a request corresponding to the masquerading link sent by the requesting end. Specifically, the fake link generation unit includes a number allocation unit, an encoding unit, a retrieval unit, a cache cleaning unit, and a cache database. There are two number allocation units, and each number allocation unit also includes a calculation unit. The initial number value of the number allocation unit A is 0, and the initial number value of the number allocation unit B is 1. For each c...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present invention relates to a link camouflage system and a method. The system comprises a camouflage link creation unit and a camouflage database. The camouflage link creation unit is used for converting an original link in a camouflage request into a corresponding camouflage link, storing the mapping relationship between the original link and the camouflage link in the camouflage database, and returning the camouflage link to a requesting party. The camouflage link creation unit comprises N number allocation units and a coding unit. Each number allocation unit is used for allocating a number value to the camouflage request as the unique identifier of the camouflage request. The coding unit is used for converting the unique identifier into the camouflage link according to a predetermined coding rule. The difference between the initial values of the number values of the N number allocation units is N. Each number allocation unit also includes a calculation unit and the calculation unit progressively increases or decreases the number value of the above number allocation unit by N in response to each camouflage request, wherein N is greater than 1.

Description

technical field [0001] The invention relates to the technical field of computers and computer software, in particular to a link camouflage system and method. Background technique [0002] In the current Internet development, hyperlinks (also known as long links) are often seen in the content of web or mobile products based on original content UGG (User Generated Content) or location-based service LBS (Location Based Service). However, the length of most hyperlinks is too long and displayed in plain text, which is not conducive to transmission security and data storage, and is also not conducive to the crawling of search engines, which in turn affects SEO (Serach Engine Optimization). In order to solve the above problems, most development teams use naming rules to shorten the connection as much as possible, but the length of the connection still cannot meet the optimization requirements. In addition, many platforms, represented by Baidu Cloud Disk, mostly adopt DNS (Domain N...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/1483
Inventor 江液
Owner PHICOMM (SHANGHAI) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products