Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Asynchronous strike anti-hotlinking method and system based on CDN edge computing network

An edge computing and anti-theft link technology, applied in the Internet field, can solve problems such as complex authentication strategies, achieve the effects of reducing real-time configuration requirements, strengthening strikes, and solving poor real-time performance

Pending Publication Date: 2022-05-13
厦门元屿安科技有限公司
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] The second purpose of the present invention is to propose an asynchronous attack anti-leeching system based on CDN edge computing network, that is, it can give priority to content response, overcome the problem of poor real-time performance, and ensure the user's first sensory effect; it can also realize complex authentication Strategies, without the need for customized transformation by manufacturers, wide application range

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asynchronous strike anti-hotlinking method and system based on CDN edge computing network
  • Asynchronous strike anti-hotlinking method and system based on CDN edge computing network
  • Asynchronous strike anti-hotlinking method and system based on CDN edge computing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0060] Such as figure 1 As shown, a method for asynchronously combating anti-leech chaining based on a CDN edge computing network in an embodiment of the present invention includes the following steps:

[0061] S1: The CDN edge node receives the request initiated by the user terminal client.

[0062] Specifically, the user terminal client initiates a content request to the CDN edge node carrying the request verification information according to the rules. For example: https: / / play.livestream.baidu.com / xxxxxxx? k1=v1&k2=v2, where the verification parameters such as k1 and k2 can be defined according to the agreement.

[0063] S2: Perform primary authentication on the legality of the request at the CDN edge node according to local authentication rules, and respond to the request after the primary authentication is passed.

[0064] Specifically, the primary authentication specifically refers to authentication using a common, conventional authentication strategy with low authen...

Embodiment 2

[0093] In this embodiment, on the basis of the first embodiment, the process of performing in-depth authentication in an asynchronous authentication mode by the asynchronous strike system is further limited.

[0094] see figure 2 , in this embodiment, the S4 of Embodiment 1 may specifically include:

[0095] S41: The CDN authentication center judges whether a cached authentication result corresponding to the request is cached locally, and the cached authentication result is within the validity period;

[0096] If there is a valid cached authentication result, when the corresponding authentication of the cached authentication result fails, the CDN edge node will strike against the response according to the cached authentication result; When the corresponding authentication is passed, no action is taken, and the CDN edge node continues to respond to the request content;

[0097] If there is no valid cached authentication result, send the request to the source site authenticat...

Embodiment 3

[0125] This embodiment corresponds to the above-mentioned embodiments, and provides an asynchronous anti-leeching system based on CDN edge computing network, please refer to figure 2 and image 3 , the system includes: a communication-connected terminal 1, a CDN edge node 2, and a CDN authentication center 3;

[0126] The CDN edge node 2 is used to receive the request initiated by the terminal; and to perform primary authentication on the legitimacy of the request, and to respond to the request after the primary authentication is passed; and to send the Request to the CDN authentication center;

[0127] The CDN authentication center 3 is used to perform in-depth authentication on the legitimacy of the request in an asynchronous authentication manner, and if the in-depth authentication fails, strike the response through the CDN edge node;

[0128] Wherein, the authentication complexity of the primary authentication is lower than the complexity of the deep authentication.

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an asynchronous strike anti-hotlinking method and system based on a CDN edge computing network. The method comprises the steps that a CDN edge node receives a request initiated by a terminal; performing primary authentication on the legality of the request at the CDN edge node, and responding to the request after the primary authentication is passed; the CDN edge node sends the request to a CDN authentication center; and the CDN authentication center carries out deep authentication on the legality of the request by adopting an asynchronous authentication mode, and if the deep authentication is not passed, the response is hit through the CDN edge node. Content response can be preferentially provided, and the first sensory effect of the user is guaranteed; and a complex authentication strategy can be realized, customized transformation of a manufacturer is not needed, and the application range is wide.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to an asynchronous anti-leeching method and system based on a CDN edge computing network. Background technique [0002] Hotlinking behavior refers to the illegal service providers bypassing other beneficial end user interfaces (such as advertisements) through technical means, and directly providing end users with service content on other service providers on their own websites, thereby defrauding end users. User browsing and click-through rates. Doing so will cause the beneficiaries of hotlinking to gain benefits with no or very little resources provided, while the real service provider loses benefits. [0003] With the rapid development of multimedia technology, hotlinking on the Internet has become more and more rampant, causing huge losses to source service providers. At present, most service providers use authentication methods to combat hotlinking. The authentication me...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L67/568
CPCH04L63/08H04L63/101H04L63/108
Inventor 宋鼎杰
Owner 厦门元屿安科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products