CN109379344B - Authentication method and authentication server for access request - Google Patents
Authentication method and authentication server for access request Download PDFInfo
- Publication number
- CN109379344B CN109379344B CN201811129593.6A CN201811129593A CN109379344B CN 109379344 B CN109379344 B CN 109379344B CN 201811129593 A CN201811129593 A CN 201811129593A CN 109379344 B CN109379344 B CN 109379344B
- Authority
- CN
- China
- Prior art keywords
- authentication
- request
- preset
- resource
- result
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 65
- 238000004590 computer program Methods 0.000 claims description 6
- 238000013467 fragmentation Methods 0.000 claims description 6
- 238000006062 fragmentation reaction Methods 0.000 claims description 6
- 239000012634 fragment Substances 0.000 claims description 5
- 230000011218 segmentation Effects 0.000 claims description 4
- 238000012545 processing Methods 0.000 abstract description 3
- 230000006872 improvement Effects 0.000 description 7
- 230000008901 benefit Effects 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000006399 behavior Effects 0.000 description 2
- 238000013461 design Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 230000002093 peripheral effect Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000018109 developmental process Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the invention relates to the technical field of data processing, and discloses an authentication method and an authentication server for an access request. The authentication method of the access request of the embodiment of the invention is applied to an authentication server and comprises the following steps: receiving an authentication request from a CDN node server, and determining a corresponding authentication algorithm type according to the authentication request; according to the determined authentication algorithm type corresponding to the authentication request, authenticating the authentication request and generating an authentication result; and sending the authentication result to the CDN node server so that the CDN node server can respond to the resource access request of the user terminal according to the authentication result. The embodiment of the invention improves the authentication accuracy and safety, greatly reduces misjudgment and is not easy to forge.
Description
Technical Field
The embodiment of the invention relates to the technical field of data processing, in particular to an authentication method and an authentication server for an access request.
Background
The development of the streaming media technology provides great convenience for users, so that the users can obtain rich streaming media resources, but the benefit of a streaming media resource provider is seriously infringed by the link stealing behavior of a link thief, namely, the link thief places resources of other resource providers on a website of the link thief and illegally links and steals the resources on a server of the resource provider, so that the conditions of bandwidth resource exhaustion or server crash and the like of the resource provider occur, therefore, the service provider adopts various anti-theft schemes to identify the link stealing request and refuses access to the link stealing request, and the link stealing behavior is effectively attacked.
In the prior art, in a Content Delivery Network (CDN) environment, a CDN node server authenticates a resource access request by using a back-source authentication anti-theft chain after receiving the resource access request from a user terminal, that is, forwards the resource access request to an authentication server of a client for authentication. However, the inventors found that at least the following problems exist in the prior art: after receiving the resource access request, the authentication server of the client performs validity check on the resource access request by using the same algorithm to complete authentication and authentication no matter what type of resource the resource access request is going to access (the algorithm is to perform validity check on a specific parameter in the resource access request in the form of a URL, if the specific parameter is valid, the access request authentication is passed), the misjudgment is high, the flexibility is low, and the risk of a stolen chain and forgery exists.
Disclosure of Invention
The embodiment of the invention aims to provide an authentication method and an authentication server for an access request, which improve the authentication accuracy and the flexibility, greatly reduce the misjudgment and are not easy to forge.
In order to solve the above technical problem, an embodiment of the present invention provides an authentication method for an access request, which is applied to an authentication server, and the authentication method for an access request includes: receiving an authentication request from a CDN node server, and determining a corresponding authentication algorithm type according to the authentication request; according to the determined authentication algorithm type corresponding to the authentication request, authenticating the authentication request and generating an authentication result; and sending the authentication result to the CDN node server so that the CDN node server can respond to the resource access request of the user terminal according to the authentication result.
The embodiment of the present invention further provides an authentication server, including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of authenticating an access request described above.
The embodiment of the present invention also provides a computer readable storage medium, which stores a computer program, wherein the computer program is used for implementing the above-mentioned method for authenticating an access request when being executed by a processor.
Compared with the prior art, the embodiment of the invention provides an authentication method applied to an access request of an authentication server, namely, the authentication request is received from a CDN node server, the corresponding authentication algorithm type is determined according to the authentication request, then the authentication request is authenticated according to the determined authentication algorithm type, an authentication result is generated, and the authentication result is sent to the CDN node server so that the CDN node server can respond to a resource access request of a user terminal according to the authentication result; the embodiment of the invention can match the corresponding authentication algorithm types according to the authentication requests of different types, adopts the matched authentication algorithm types to authenticate the authentication requests, can provide authentication schemes of different dimensions according to the authentication requests, has higher safety, replaces the mode of adopting the same authentication algorithm for all the authentication requests in the prior art, improves the authentication accuracy and flexibility, greatly reduces misjudgment and is not easy to forge.
In addition, the authentication request carries a request mode identifier for requesting the resource to be accessed; the determining the corresponding authentication algorithm type according to the authentication request specifically comprises: and determining the authentication algorithm type corresponding to the authentication request according to the preset corresponding relation between the request mode identifier and the authentication algorithm type. In this embodiment, a specific way of determining an authentication algorithm according to an authentication request is provided.
In addition, according to the determined authentication algorithm type corresponding to the authentication request, authenticating the authentication request and generating an authentication result, including: acquiring characteristic parameters corresponding to URLs corresponding to the resources to be accessed from a preset starting moment to a current moment; the authentication request comprises a URL corresponding to the resource to be accessed; judging whether the characteristic parameters are matched with preset parameters or not and generating a matching result; the preset parameters correspond to the preset starting time and the preset ending time; and generating the authentication result according to the matching result. In this embodiment, an authentication algorithm for authenticating an authentication request is provided.
In addition, the request mode identification is a fragment request identification or a segment request identification; the obtaining of the characteristic parameters corresponding to the URL corresponding to the resource to be accessed from the preset starting moment to the current moment includes: acquiring the number of user terminals accessing the URL corresponding to the resource to be accessed from the preset starting moment to the current moment; the preset parameters are a first preset number; the authentication result generated according to the matching result is as follows: if the matching result is that the number exceeds the first preset number, and the user terminal triggering the authentication request does not belong to the user terminals in the first preset number, generating the authentication result of the non-legal request; and if the matching result is that the number does not exceed the first preset number, generating the authentication result of the legal request. In this embodiment, when the request type identifier is a fragment request identifier or a segment request identifier, a specific authentication algorithm for authenticating the authentication request is provided, that is, the number of the user terminals accessing the URL is the feature parameter corresponding to the URL carried in the authentication request, which satisfies the authentication requirement of the user terminals being blocked by the client.
In addition, the request mode identification is a one-time request loading complete resource identification; the obtaining of the characteristic parameters corresponding to the URL corresponding to the resource to be accessed from the preset starting moment to the current moment includes: acquiring the accessed times of the URL corresponding to the resource to be accessed from the preset starting moment to the current moment; the preset parameter is a first preset number of times; the authentication result generated according to the matching result is as follows: if the matching result is that the number of times of access exceeds the first preset number of times, generating the authentication result of the non-legal request; and if the matching result is that the number of times of access does not exceed the first preset number of times, generating the authentication result of the legal request. In this embodiment, when the request mode identifier is a request for loading a complete resource identifier, a specific authentication algorithm for authenticating the authentication request is provided, so that the authentication requirement of the user for forbidding the URL corresponding to the resource to be accessed is met.
In addition, the preset parameters are carried by the URL corresponding to the resource to be accessed. In the embodiment, a configuration mode of the preset parameters is provided, and the preset parameters are dynamically carried by the URL, so that various authentication requirements are met and the authentication speed is increased.
In addition, the request mode identification is a one-time request loading complete resource identification; the obtaining of the characteristic parameters corresponding to the URL corresponding to the resource to be accessed from the preset starting moment to the current moment includes: acquiring the number of times that the user terminal accesses the URL corresponding to the resource to be accessed from the preset starting moment to the current moment; the preset parameter is a second preset number of times; the authentication result generated according to the matching result is as follows: if the matching result is that the times exceed the second preset times, generating the authentication result of the non-legal request; and if the matching result is that the times do not exceed the second preset times, generating the authentication result of the legal request. In the embodiment, when a request is loaded with a complete resource identifier once, another specific authentication algorithm for authenticating the authentication request is provided, so that the authentication requirement of the user terminal for forbidding the user to access the resource to be accessed is met.
In addition, the request mode identifier is a one-time request loading complete resource identifier; the obtaining of the characteristic parameters corresponding to the URL corresponding to the resource to be accessed from the preset starting moment to the current moment includes: acquiring the number of times that the user terminal accesses the URL corresponding to the resource to be accessed from the preset starting moment to the current moment; the preset parameter is a second preset number of times; the authentication result generated according to the matching result is as follows: if the matching result is that the times exceed the second preset times, generating the authentication result of the non-legal request; and if the matching result is that the times do not exceed the second preset times, generating the authentication result of the legal request. In the embodiment, when a request is loaded with a complete resource identifier once, another specific authentication algorithm for authenticating the authentication request is provided, so that the authentication requirement of the user terminal for forbidding the user to access the resource to be accessed is met.
In addition, before determining the corresponding authentication algorithm type according to the authentication request, the method further includes: and receiving an updating request for the preset corresponding relation, and updating the authentication algorithm type corresponding to the request mode identification. In the embodiment, the preset corresponding relation is updated according to the received updating request, so that the requirement of a server configuration party on real-time configuration is met, and convenience is provided for the configuration of the server.
In addition, the authentication request carries a forbidden object; the determining of the corresponding authentication algorithm type according to the authentication request is as follows: and determining the corresponding authentication algorithm type according to the forbidden object. In this embodiment, another specific way of determining the authentication algorithm according to the authentication request is provided.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a detailed flowchart of an authentication method of an access request according to a first embodiment;
fig. 2 is a detailed flowchart of an authentication method of an access request according to a second embodiment;
fig. 3 is a detailed flowchart of an authentication method of an access request according to a third embodiment;
fig. 4 is a detailed flowchart of an authentication method of an access request according to a fourth embodiment;
fig. 5 is a detailed flowchart of an authentication method of an access request according to a fifth embodiment;
fig. 6 is a detailed flowchart of an authentication method of an access request according to a sixth embodiment;
fig. 7 is a detailed flowchart of an authentication method of an access request according to a seventh embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that numerous technical details are set forth in order to provide a better understanding of the present application in various embodiments of the present invention. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments.
A first embodiment of the present invention relates to an authentication method for an access request, which is applied to an authentication server, and as shown in fig. 1, the authentication method for an access request includes:
In the embodiment, the authentication server is deployed on a service provider side of the CDN node server, that is, the CDN node server sends the authentication request to the authentication server of its own home, which replaces a mode in which the CDN node server sends the authentication request to the authentication server of the client in the back-source authentication anti-theft chain in the prior art, so that a customer omits a series of operations such as establishment of the authentication server, research and maintenance of an authentication algorithm, and hands over the authentication server to provide the authentication service, thereby saving cost for the customer.
In this embodiment, after receiving a resource access request for a resource to be accessed from a user terminal, a CDN node server forwards the resource access request to an authentication server, that is, sends an authentication request to the authentication server; the authentication request may include a unique URL request, but is not limited thereto, and the form of the authentication request is not limited in this embodiment.
And 102, authenticating the authentication request according to the authentication algorithm type corresponding to the determined authentication request and generating an authentication result.
In this embodiment, the authentication result includes two authentication results, i.e., a legal request and an illegal request.
And 103, sending the authentication result to the CDN node server so that the CDN node server can respond to the resource access request of the user terminal according to the authentication result.
In this embodiment, after receiving the authentication result of the legal request, the CDN node server sends the resource to be accessed to the user terminal, and after receiving the authentication result of the illegal request, refuses to send the resource to be accessed to the user terminal.
Compared with the prior art, the embodiment of the invention provides an authentication method applied to an access request of an authentication server, namely, the authentication request is received from a CDN node server, the corresponding authentication algorithm type is determined according to the authentication request, then the authentication request is authenticated according to the determined authentication algorithm type, an authentication result is generated, and the authentication result is sent to the CDN node server so that the CDN node server can respond to a resource access request of a user terminal according to the authentication result; the embodiment of the invention can match the corresponding authentication algorithm types according to the authentication requests of different types, adopts the matched authentication algorithm types to authenticate the authentication requests, can provide authentication schemes of different dimensions according to the authentication requests, has higher safety, replaces the mode of adopting the same authentication algorithm for all the authentication requests in the prior art, improves the authentication accuracy and flexibility, greatly reduces misjudgment and is not easy to forge.
The following describes implementation details of the access request authentication method according to the present embodiment in detail, and the following is only provided for easy understanding and is not necessary for implementing the present embodiment.
In one example, the authentication request carries a request mode identifier of a resource to be accessed; the authentication server prestores a preset corresponding relation between the request mode identification and the authentication algorithm type. Determining the corresponding authentication algorithm type according to the authentication request, specifically: determining an authentication algorithm type corresponding to the authentication request according to a preset corresponding relation between the request mode identifier and the authentication algorithm type; however, this embodiment is only an exemplary one, and the present embodiment does not set any limitation to the manner of determining the type of the authentication algorithm according to the authentication request.
In one example, the request mode identifier is a one-time request loading complete resource identifier, a fragmentation request identifier or a segmentation request identifier; however, this embodiment is only an exemplary embodiment, and the present embodiment does not set any limitation on the type of the request mode identifier.
In one example, the one-request-to-load full resource identifier may be a one-request-to-load full resource identifier of an FLV file type or a one-request-to-load full resource identifier of an MP4 file type; the fragmentation request identifier may be a fragmentation request identifier of an HLS file type; the segment request identifier may be a segment request identifier of an FLV file type or a segment request identifier of an MP4 file type; the segment request identifier is, for example, a range identifier carried in an http request header; however, this embodiment is only an exemplary embodiment, and the specific file type of the file is not limited in any way.
The steps of the above methods are divided for clarity, and the implementation may be combined into one step or split some steps, and the steps are divided into multiple steps, so long as the same logical relationship is included, which are all within the protection scope of the present patent; it is within the scope of the patent to add insignificant modifications to the algorithms or processes or to introduce insignificant design changes to the core design without changing the algorithms or processes.
A second embodiment of the invention relates to a method of authenticating an access request. The second embodiment is improved on the basis of the first embodiment, and the main improvement lies in that: in a second embodiment of the invention, a specific authentication algorithm for the authentication request is provided.
Fig. 2 shows an authentication method for an access request in this embodiment, steps 201 and 203 are the same as steps 101 and 103 in the first embodiment, and are not described herein again, and step 202 in this embodiment includes the following sub-steps:
the substep 2021 obtains a feature parameter corresponding to the URL corresponding to the resource to be accessed from the preset starting time to the current time.
In this embodiment, the authentication request includes a URL corresponding to the resource to be accessed.
And a substep 2022 of matching the characteristic parameters with preset parameters and generating a matching result.
In this embodiment, the preset parameter corresponds to a preset starting time to a preset ending time. The preset parameters may be pre-configured in the authentication server (however, the configuration manner of the preset parameters is not limited at all). In addition, the matching result includes matching and not matching.
In an example, the preset starting time is, for example, 00.00 per day, and the preset ending time may be 24.00 per day, but in practice, the preset starting time is not limited thereto, and the time length between the preset starting time and the preset ending time and the specific time are not limited in any way in this embodiment.
In one example, the preset start time is 18.00 points, the preset stop time is 23.00 points, and the preset parameters are parameters corresponding to 18.00 points to 23.00 points.
In this embodiment, the authentication result of the legal request is generated according to the matching result, and the authentication result of the non-legal request is generated according to the unmatching matching result.
Compared with the prior art, the embodiment provides a specific authentication algorithm for the authentication request; the method comprises the steps of acquiring characteristic parameters corresponding to a URL corresponding to a resource to be accessed from a preset starting moment to a current moment, matching the characteristic parameters with the preset parameters to generate a matching result as the characteristic parameters are real-time effective characteristic parameters of the URL, and generating an authentication result according to the matching result, so that the URL of the stealing link resource can be found in real time, the possible risk of stealing link is avoided, and the accuracy of the authentication result is further improved.
The third embodiment of the present invention relates to an authentication method of an access request, which is improved on the basis of the second embodiment, and the main improvement is that: in the third embodiment of the present invention, when the request mode identifier requesting the resource to be accessed is the fragmentation request identifier or the segmentation request identifier, the feature parameter corresponding to the URL carried in the authentication request is the number of the user terminals accessing the URL.
Fig. 3 shows an authentication method for an access request in this embodiment, steps 301 and 303 are the same as steps 201 and 203 in the second embodiment, and are not described herein again, and step 302 in this embodiment includes the following sub-steps:
and a substep 3021, acquiring the number of the user terminals accessing the URL corresponding to the resource to be accessed from the preset starting time to the current time.
In one example, the user terminal may be represented by an IP address of the user terminal, that is, the number of IPs of the user terminal accessing the URL from a preset starting time to a current time is obtained; however, this embodiment is only an exemplary illustration, and the present embodiment does not set any limitation on the manner of counting the number of user terminals accessing the URL.
In this embodiment, the authentication request carries a request mode identifier for requesting the resource to be accessed, a URL corresponding to the resource to be accessed, and an IP address of the user terminal, and determines that the request mode identifier is a fragment request identifier or a segment request identifier.
In this embodiment, the number of IPs accessing the URL in the preset period may be periodically obtained, for example, once every 5 minutes, but in practice, the present embodiment is not limited to this, and for example, the number may also be obtained in real time.
In this embodiment, the authentication server receives an authentication request including a URL indicating that the URL is accessed by the user terminal; in one example, the authentication server is preset to record the number of IPs of the user terminal accessing each URL from a preset start time to the current time (if a certain URL is accessed by the same terminal for multiple times, the IP of the user terminal is recorded as one), so as to directly obtain the number of IPs of the URL from the recorded preset start time to the current time; however, this embodiment is only an exemplary illustration, and the present embodiment does not limit the manner of acquiring the IP number.
Sub-step 3022, matching the number of user terminals accessing the URL with a first preset number and generating a matching result.
In this embodiment, the preset parameter is a first preset number; the first preset number may be, for example, 6, but in practice, the present embodiment is not limited to this, and the specific numerical value of the first preset number is not limited at all, for example, the first preset number may be set in consideration of a situation that the users in the region use the network of the small operator (a situation that the network of the small operator has multiple outlets IP), and if there are more users using the network of the small operator, the numerical value of the first preset number may be set to be higher.
In one example, the first preset number is carried by a URL corresponding to the resource to be accessed, that is, the URL dynamically carries the first preset number; for example, if the extracted URL dynamically carries a first preset number of 8, it indicates that the URL is only allowed to be accessed by 8 user terminals, but in practice, the URL is not limited thereto, and this embodiment does not limit this.
In this embodiment, the number of the user terminals may be used as the number of the user terminals, and the obtained number of the user terminals may be compared with the first preset number; when the number of the IPs is smaller than or equal to a first preset number, generating a matching result; when the number of the IPs exceeds a first preset number, generating a mismatching result; however, the present invention is not limited thereto, and the present embodiment does not limit the present invention.
And a substep 3023, if the number of the matching results exceeds the first preset number and it is determined that the ue triggering the authentication request does not belong to the ues in the first preset number, generating an authentication result of the unauthorized request.
In this embodiment, if the number of the matching results exceeds the first preset number and it is determined that the ue triggering the authentication request does not belong to the ues in the first preset number, it indicates that the ue triggering the authentication request accesses the resource to be accessed for the first time from the preset starting time to the current time, and the ue accesses the URL after the first preset number, and then generates the authentication result of the unauthorized request.
In one example, the number of IPs of the user terminals that acquire the URL corresponding to the access video a from the preset start time to the current time is 8 (the user terminal that triggers the authentication request of this time is the 8 th terminal that accesses the URL), the 8 user terminals that access the URL are terminals C1, C2, C5, C7, C11, C15, C9, and C14, respectively, and the first preset number is 7; obviously, if the number of the 8 user terminals exceeds 7, and C14 is not one of the first 7 user terminals, an authentication result of the non-legal request is generated; however, this is merely an example and is not limited thereto.
And a substep 3024, generating an authentication result of the valid request if the number of the matching results does not exceed the first preset number.
In this embodiment, if the number of the matching results does not exceed the first preset number and it is determined that the user terminal triggering the authentication request belongs to the user terminals in the first preset number, it is indicated that the user terminal triggering the authentication request has previously accessed the URL and the access sequence number of the terminal is less than or equal to the first preset number, and the authentication result of the legal request is generated.
In one example, the number of IPs of the user terminals that acquire the URL corresponding to the access video a from the preset start time to the current time is 8 (the user terminal that triggers the authentication request of this time is the 8 th terminal that accesses the URL), the 8 user terminals that access the URL are terminals C1, C2, C5, C7, C11, C15, C9, and C5, respectively, and the first preset number is 7; obviously, if the number of 8 exceeds 7 and C5 is one of the first 7 ues, the authentication result of the legal request is generated; however, this is merely an example and is not limited thereto.
Compared with the first implementation mode, the embodiment of the invention has the advantages that when the request mode identifier is the fragmentation request identifier or the segmentation request identifier, the characteristic parameters corresponding to the URL carried by the authentication request are the number of the user terminals accessing the URL, namely, the forbidden object of the embodiment is the user terminal (if a hotlink is found, the user terminal is forbidden), and the request mode identifier carried by the authentication request is matched with a specific authentication algorithm, so that the flexibility and the efficiency are high, and the diversified authentication requirements of customers are met.
A fourth embodiment of the invention relates to a method of authenticating an access request. The fourth embodiment is improved on the basis of the second embodiment, and the main improvement lies in that: in the fourth embodiment of the present invention, when the request type identifier is a request for loading a complete resource identifier, the characteristic parameter corresponding to the URL carried in the authentication request is the number of times the URL is accessed.
Fig. 4 shows an authentication method for an access request in this embodiment, steps 401 and 403 are the same as steps 201 and 203 in the first embodiment, and are not described herein again, and step 402 in this embodiment includes the following sub-steps:
in sub-step 4021, the number of times of access to the URL corresponding to the resource to be accessed from the preset start time to the current time is obtained.
In this embodiment, the authentication request carries a request mode identifier for requesting a resource to be accessed and a URL corresponding to the resource to be accessed, and the request mode identifier is a one-time request complete resource identifier.
In this embodiment, the number of times that the URL is accessed in the preset period may be periodically obtained, for example, obtained every 5 minutes, but is not limited to this, and for example, the URL may also be obtained in real time in this embodiment.
In this embodiment, the authentication server receives an authentication request including the URL, indicating that the URL is accessed by the user terminal; moreover, the URL may be accessed by the same user terminal for multiple times, or may be accessed by different user terminals. In one example, the authentication server may be preset to record and store the number of times of access to the URL included in the authentication request received from the preset start time to the current time, so as to directly obtain the number of times of access to the URL from the preset start time to the current time; however, this embodiment is only an exemplary illustration, and the present embodiment does not set any limitation on the manner in which the URL is accessed.
And a sub-step 4022 of matching the accessed times with the first preset times and generating a matching result.
In this embodiment, the preset parameter is a first preset number of times; the first preset number of times may be 5 times or 10 times, and an appropriate value may be set in consideration of a scene where the authentication request is abnormally disconnected.
In one example, the first preset times are carried by the URL corresponding to the resource to be accessed, that is, the URL dynamically carries the first preset times, so that various authentication requirements are met, and the first preset times are directly obtained from the URL (configuration work on the authentication server is saved), so that the authentication speed is increased; for example, if the extracted URL dynamically carries the first preset number of times of 10, it indicates that the URL is only allowed to be accessed 10 times, but in practice, the present embodiment is not limited thereto.
In an example, the obtained number of accesses may be compared with a first preset number, if the number of accesses exceeds the first preset number, a non-matching result is generated, and if the number of accesses is less than or equal to the first preset number, a matching result is generated, which is only an exemplary illustration, and the specific generation manner of the matching result is not limited in this embodiment.
In the sub-step 4023, if the matching result is that the number of times of access exceeds a first preset number of times, an authentication result of the non-legal request is generated.
In the sub-step 4024, if the matching result is that the number of times of access does not exceed the first preset number of times, an authentication result of the legal request is generated.
In a specific example, the preset starting time is 12.00 points, the preset ending time is 21.00 points, the current time is 15.00 points, and the first preset times corresponding to 12.00 to 21.00 are 12 times; the number of access times of the URL corresponding to the video A from 12.00 to 15.00 is 15, obviously, the number of access times exceeds the preset number of access times by 12, and an authentication result of a non-legal request is generated; however, this is merely an example and is not limited thereto.
Compared with the second embodiment, when the request mode identifier is a request for loading a complete resource identifier, the feature parameter corresponding to the URL carried in the authentication request is the number of times the URL is accessed, that is, the banned object in the embodiment is the URL (if a hotlink is found, the URL is prohibited from being accessed), and the request mode identifier carried in the authentication request is matched with a specific authentication algorithm, so that the method is flexible and efficient, and meets diversified authentication requirements of customers.
A fifth embodiment of the present invention relates to an authentication method for an access request. The fifth embodiment is improved on the basis of the second embodiment, and the main improvement lies in that: in the fifth embodiment of the present invention, when the request type identifier is a request for loading a complete resource identifier, the characteristic parameter corresponding to the URL carried in the authentication request is the number of times that the user terminal triggering the authentication request accesses the URL.
Fig. 5 shows an authentication method for an access request in this embodiment, steps 501 and 503 are the same as steps 201 and 203 in the first embodiment, and are not described herein again, and step 502 in this embodiment includes the following sub-steps:
in sub-step 5021, the number of times that the user terminal accesses the URL corresponding to the resource to be accessed from the preset starting time to the current time is obtained.
In this embodiment, the authentication request carries a request mode identifier for requesting the resource to be accessed, an identifier (e.g., an IP address) of the user terminal requesting the resource to be accessed, and a URL corresponding to the resource to be accessed, and the request mode identifier is a request for loading a complete resource identifier.
In this embodiment, the number of times that the user terminal accesses the URL from the preset start time to the current time may be periodically obtained, for example, obtained every 10 minutes, but in practice, the present embodiment is not limited to this, and for example, the present embodiment may also obtain the URL in real time.
In this embodiment, the authentication server receives the authentication request including the URL once, indicating that the URL is sequentially accessed by the user terminal; in one example, the authentication server may be preset, the user terminal is represented by an IP address of the user terminal, and the number of times that the IP of each user terminal accesses each URL from a preset start time to the current time is recorded and stored, so that the number of times that the user terminal accesses the URL from the preset start time to the current time is directly obtained; however, this embodiment is only an exemplary illustration, and the obtaining manner of the number of times that the user terminal accesses the URL is not limited in any way.
In this embodiment, the preset parameter is a second preset number of times; the second preset number may be 15 or 25, and the number of the second preset number is not limited in this embodiment.
In one example, the obtained times may be compared with a second preset time, and when the times exceed the second preset time, an unmatched matching result is generated; and when the times do not exceed the second preset times, generating a matching result. However, this embodiment is only an exemplary embodiment, and the specific determination method is not limited in any way.
In the substep 5023, if the number of the matching results exceeds the second preset number, the authentication result of the non-legal request is generated.
In the substep 5024, if the number of the matching results does not exceed the second preset number of times, an authentication result of the legal request is generated.
In one example, the preset starting time is 8.00 points, the preset ending time is 20.00 points, the current time is 17.00 points, and the second preset times corresponding to 8.00-20.00 are 8 times; the number of times of accessing the URL corresponding to the video A at the user terminal from 8.00 to 17.00 is 6, obviously the number of times of 6 does not exceed the second preset number of times of 8, and an authentication result of a legal request is generated; however, this is merely an example and is not limited thereto.
Compared with the second implementation mode, when the request mode identifier is a request for loading a complete resource identifier, the characteristic parameter corresponding to the URL carried by the authentication request is the number of times that the user terminal triggering the authentication request accesses the URL, that is, the forbidden object of the implementation mode is the user terminal (if a stealing link is found, the user terminal is forbidden), and the request mode identifier carried by the authentication request is matched with a specific authentication algorithm, so that the implementation mode is flexible and efficient, and meets the diversified authentication requirements of customers.
A sixth embodiment of the present invention relates to an authentication method of an access request. The sixth embodiment is an improvement on the second embodiment, and the main improvement lies in that: in the sixth embodiment of the present invention, when the file type of the resource to be accessed is the type of the FLV/MP4 requesting to load the complete resource once, the feature parameter corresponding to the URL of the resource to be accessed is the number of different URLs when the user terminal accesses the domain name corresponding to the URL.
Fig. 6 shows an authentication method for an access request in this embodiment, steps 601 and 603 are the same as steps 201 and 203 in the first embodiment, and are not described herein again, and step 602 in this embodiment includes the following sub-steps:
and a substep 6021 of obtaining the number of different URLs under the domain name corresponding to the URL accessed by the user terminal from the preset starting time to the current time.
In this embodiment, the authentication request carries the file type of the resource to be accessed, the domain name and the URL corresponding to the resource to be accessed, and it is determined that the file type is the type of the FLV/MP4 that requests to load the complete resource once. In this embodiment, the preset period is, for example, 12 hours, and the specific duration of the preset period is not limited at all, and may be set according to an actual situation.
In this embodiment, the number of times of accessing the URL in the preset period may be periodically obtained, for example, obtained once every 10 minutes, but in practice, the present embodiment is not limited to this, and for example, the URL may also be obtained in real time.
In one example, the authentication server receives an authentication request, that is, it indicates that the user terminal (for example, the user terminal may be characterized by an IP address of the user terminal) accesses a domain name carried in the authentication request; the authentication server may count the number of different URLs of the domain name accessed by the user terminal in a preset period, so as to obtain the number of different URLs of the domain name accessed by the user terminal in the preset period.
And a substep 6022 of matching the number with a second preset number and generating a matching result.
In this embodiment, the preset parameter is a second preset number; the second preset number is, for example, 100, but in practice, the present embodiment is not limited thereto, and the specific value of the second preset number is not limited at all, and can be set according to the tolerance of the customer to the chain thief, so as to avoid the false prohibition of the normal user as much as possible.
In an example, the obtained number may be compared with a second preset number, and when the number of different URLs under the domain name corresponding to the URL exceeds the second preset number, an unmatched matching result is generated; when the number of different URLs under the domain name corresponding to the URL does not exceed a second preset number, generating a matching result; however, this embodiment is only an exemplary embodiment, and the specific determination method is not limited in any way.
And a substep 6023 of generating an authentication result of the non-legal request if the number of the matching results exceeds a second preset number.
And a substep 6024 of generating an authentication result of the legal request if the number of the matching results does not exceed the second preset number.
In one example, the predetermined period is 5 hours and the second predetermined number is 100; the number of different URLs of which the domain name is kanshi accessed by the user terminal within 5 hours in one preset period is 30, and obviously, 30 is smaller than the second preset number 100, so that the authentication result of the legal request is generated; however, this is merely an example and is not limited thereto.
In one example, the preset starting time is 15.00 points, the preset ending time is 22.00 points, the current time is 16.00 points, and the second preset number corresponding to 15.00 to 22.00 is 25 times; requesting a user terminal to access a video A under a domain name abc.com by the authentication request, wherein the number of different URLs under the domain name abc.com accessed by the user terminal is 13 from 15.00 to 16.00, and obviously, the number of the different URLs does not exceed 25 of a second preset number, so that an authentication result of a legal request is generated; however, this is merely an example and is not limited thereto.
Compared with the second embodiment, when the request mode identifier is a request for loading a complete resource identifier, the characteristic parameters corresponding to the URL of the resource to be accessed are the number of different URLs when the user terminal accesses the domain name corresponding to the URL, that is, the forbidden object of the embodiment is the user terminal (if a hotlink is found, the user terminal is forbidden), and the request mode identifier carried by the authentication request is matched with a specific authentication algorithm, so that the method is flexible and efficient, and meets the diversified authentication requirements of clients.
A seventh embodiment of the present invention relates to an authentication method of an access request. The seventh embodiment is improved on the basis of the first embodiment, and the main improvement lies in that: in the seventh embodiment of the present invention, the authentication algorithm type corresponding to the request mode identifier is also updated.
In an example, the method for authenticating an access request in this embodiment is shown in fig. 7, steps 703 and 704 are the same as steps 102 and 103 in the first embodiment, and are not described herein again, and steps 701 and 702 in this embodiment are as follows:
In this embodiment, the preset corresponding relationship is a preset corresponding relationship between a request mode identifier and an authentication algorithm type, which are pre-stored in the authentication server. The updating request at least comprises a request mode identifier to be updated and an authentication algorithm type corresponding to the request mode identifier, and when the updating request of the preset corresponding relation is received, the authentication algorithm type corresponding to the request mode identifier to be updated is updated according to the updating request.
For the related description of this step, please refer to the first embodiment, which is not repeated herein.
In fact, the present example may be a modification of any of the second to sixth embodiments.
In another example, the authentication request carries a blocking object (e.g., IP or URL); determining the corresponding authentication algorithm type according to the authentication request, wherein the authentication algorithm type is as follows: determining a corresponding authentication algorithm type according to the forbidden object; however, in practice, the present embodiment does not limit the determination method of the authentication algorithm type.
In another example, the authentication request carries a file type of the resource to be accessed (the file type is, for example, FLV/MP4), and the corresponding authentication algorithm type is determined according to the authentication request, and is: determining a corresponding authentication algorithm type according to the file type; however, in practice, the present embodiment does not limit the determination method of the authentication algorithm type.
Compared with the first embodiment, the embodiment of the invention updates the authentication algorithm type corresponding to the request mode identifier according to the update request when receiving the update request of the preset corresponding relation between the request mode identifier and the authentication algorithm type, thereby meeting the requirement of real-time configuration of a server configuration party and providing convenience for the configuration of the server.
An eighth embodiment of the present invention relates to an authentication server including: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of authenticating an access request as in any one of the first to seventh embodiments.
Where the memory and processor are connected by a bus, the bus may comprise any number of interconnected buses and bridges, the buses connecting together one or more of the various circuits of the processor and the memory. The bus may also connect various other circuits such as peripherals, voltage regulators, power management circuits, etc., which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the transceiver. The transceiver may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. The data processed by the processor is transmitted over a wireless medium through an antenna, which further receives the data and transmits the data to the processor.
The processor is responsible for managing the bus and general processing and may also provide various functions including timing, peripheral interfaces, voltage regulation, power management, and other control functions. And the memory may be used to store data used by the processor in performing operations.
Compared with the prior art, the embodiment of the invention provides an authentication method applied to an access request of an authentication server, namely, the authentication request is received from a CDN node server, the corresponding authentication algorithm type is determined according to the authentication request, then the authentication request is authenticated according to the determined authentication algorithm type, an authentication result is generated, and the authentication result is sent to the CDN node server so that the CDN node server can respond to a resource access request of a user terminal according to the authentication result; the embodiment of the invention can match the corresponding authentication algorithm types according to the authentication requests of different types, adopts the matched authentication algorithm types to authenticate the authentication requests, can provide authentication schemes of different dimensions according to the authentication requests, has higher safety, replaces the mode of adopting the same authentication algorithm for all the authentication requests in the prior art, improves the authentication accuracy and flexibility, greatly reduces misjudgment and is not easy to forge.
A ninth embodiment of the present invention relates to a computer-readable storage medium storing a computer program. The computer program, when executed by the processor, implements the method of authenticating an access request of any one of the first to sixth embodiments.
Compared with the prior art, the embodiment of the invention provides an authentication method applied to an access request of an authentication server, namely, the authentication request is received from a CDN node server, the corresponding authentication algorithm type is determined according to the authentication request, then the authentication request is authenticated according to the determined authentication algorithm type, an authentication result is generated, and the authentication result is sent to the CDN node server so that the CDN node server can respond to a resource access request of a user terminal according to the authentication result; the embodiment of the invention can match the corresponding authentication algorithm types according to the authentication requests of different types, adopts the matched authentication algorithm types to authenticate the authentication requests, can provide authentication schemes of different dimensions according to the authentication requests, has higher safety, replaces the mode of adopting the same authentication algorithm for all the authentication requests in the prior art, improves the authentication accuracy and flexibility, greatly reduces misjudgment and is not easy to forge.
That is, as can be understood by those skilled in the art, all or part of the steps in the method for implementing the embodiments described above may be implemented by a program instructing related hardware, where the program is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
It will be understood by those of ordinary skill in the art that the foregoing embodiments are specific examples for carrying out the invention, and that various changes in form and details may be made therein without departing from the spirit and scope of the invention in practice.
Claims (12)
1. An authentication method for an access request, which is applied to an authentication server, is characterized in that the authentication method for the access request comprises the following steps:
receiving an authentication request from a CDN node server, and determining a corresponding authentication algorithm type according to the authentication request;
according to the determined authentication algorithm type corresponding to the authentication request, authenticating the authentication request and generating an authentication result; and
sending the authentication result to the CDN node server so that the CDN node server can respond to a resource access request of a user terminal according to the authentication result;
the authentication request carries a request mode identifier for requesting a resource to be accessed, and the determination of the corresponding authentication algorithm type according to the authentication request comprises the following steps:
and determining the authentication algorithm type corresponding to the authentication request according to the preset corresponding relation between the request mode identifier and the authentication algorithm type.
2. The method for authenticating an access request according to claim 1, wherein the request type identifier is a one-time request loading complete resource identifier, a fragment request identifier, or a fragment request identifier.
3. The method for authenticating an access request according to claim 1, wherein the authenticating the authentication request and generating an authentication result according to the determined authentication algorithm type corresponding to the authentication request comprises:
acquiring characteristic parameters corresponding to URLs corresponding to the resources to be accessed from a preset starting moment to a current moment; the authentication request comprises a URL corresponding to the resource to be accessed;
matching the characteristic parameters with preset parameters and generating a matching result; the preset parameters correspond to the preset starting time and the preset ending time;
and generating the authentication result according to the matching result.
4. The method for authenticating access request according to claim 3, wherein the request mode identifier is a fragmentation request identifier or a segmentation request identifier; the obtaining of the characteristic parameters corresponding to the URL corresponding to the resource to be accessed from the preset starting moment to the current moment includes:
acquiring the number of user terminals accessing the URL corresponding to the resource to be accessed from the preset starting moment to the current moment;
the preset parameters are a first preset number; the authentication result generated according to the matching result is as follows:
if the matching result is that the number exceeds the first preset number, and the user terminal triggering the authentication request does not belong to the user terminals in the first preset number, generating the authentication result of the non-legal request;
and if the matching result is that the number does not exceed the first preset number, generating the authentication result of the legal request.
5. The method for authenticating an access request according to claim 3, wherein the request mode identifier is a one-time request loading complete resource identifier; the obtaining of the characteristic parameters corresponding to the URL corresponding to the resource to be accessed from the preset starting moment to the current moment includes:
acquiring the accessed times of the URL corresponding to the resource to be accessed from the preset starting moment to the current moment;
the preset parameter is a first preset number of times; the authentication result generated according to the matching result is as follows:
if the matching result is that the number of times of access exceeds the first preset number of times, generating the authentication result of the non-legal request;
and if the matching result is that the number of times of access does not exceed the first preset number of times, generating the authentication result of the legal request.
6. The method for authenticating an access request according to claim 4 or 5, wherein the preset parameters are carried by the URL corresponding to the resource to be accessed.
7. The method for authenticating an access request according to claim 3, wherein the request mode identifier is a one-time request loading complete resource identifier; the obtaining of the characteristic parameters corresponding to the URL corresponding to the resource to be accessed from the preset starting moment to the current moment includes:
acquiring the number of times that the user terminal accesses the URL corresponding to the resource to be accessed from the preset starting moment to the current moment;
the preset parameter is a second preset number of times; the authentication result generated according to the matching result is as follows:
if the matching result is that the times exceed the second preset times, generating the authentication result of the non-legal request;
and if the matching result is that the times do not exceed the second preset times, generating the authentication result of the legal request.
8. The method for authenticating an access request according to claim 3, wherein the request mode identifier is a one-time request loading complete resource identifier; the obtaining of the characteristic parameters corresponding to the URL corresponding to the resource to be accessed from the preset starting moment to the current moment includes:
acquiring the number of different URLs under the condition that the user terminal accesses the domain name corresponding to the URL from the preset starting moment to the current moment;
the preset parameter is a second preset quantity; the authentication result generated according to the matching result is as follows:
if the matching result is that the number exceeds the second preset number, generating the authentication result of the non-legal request;
and if the matching result is that the number does not exceed the second preset number, generating the authentication result of the legal request.
9. The method of claim 1, wherein before determining the corresponding authentication algorithm type according to the authentication request, the method further comprises:
and receiving an updating request for the preset corresponding relation, and updating the authentication algorithm type corresponding to the request mode identification.
10. The method of claim 1, wherein the authentication request carries a block object; the determining of the corresponding authentication algorithm type according to the authentication request is as follows:
and determining the corresponding authentication algorithm type according to the forbidden object.
11. An authentication server, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of authenticating an access request according to any one of claims 1 to 10.
12. A computer-readable storage medium, storing a computer program, characterized in that the computer program, when being executed by a processor, implements the method for authenticating an access request according to any one of claims 1 to 10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811129593.6A CN109379344B (en) | 2018-09-27 | 2018-09-27 | Authentication method and authentication server for access request |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811129593.6A CN109379344B (en) | 2018-09-27 | 2018-09-27 | Authentication method and authentication server for access request |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109379344A CN109379344A (en) | 2019-02-22 |
CN109379344B true CN109379344B (en) | 2022-05-10 |
Family
ID=65402245
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811129593.6A Active CN109379344B (en) | 2018-09-27 | 2018-09-27 | Authentication method and authentication server for access request |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109379344B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110990853B (en) * | 2019-11-29 | 2022-05-06 | 天津市滨海新区信息技术创新中心 | Dynamic heterogeneous redundant data access protection method and device |
CN112929321B (en) * | 2019-12-05 | 2023-02-03 | 北京金山云网络技术有限公司 | Authentication method, device and terminal equipment |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104253818A (en) * | 2011-12-13 | 2014-12-31 | 华为终端有限公司 | Server and terminal authentication method, server, terminal |
CN105184133A (en) * | 2015-07-30 | 2015-12-23 | 广东欧珀移动通信有限公司 | Authentication method and apparatus, and corresponding mobile terminal |
CN105357190A (en) * | 2015-10-26 | 2016-02-24 | 网宿科技股份有限公司 | Method and system for performing authentication on access request |
US9379896B1 (en) * | 2011-10-24 | 2016-06-28 | Google Inc. | Compromised password mitigation |
CN105790943A (en) * | 2014-12-22 | 2016-07-20 | 中兴通讯股份有限公司 | License pre-authentication method, device and system |
CN106657034A (en) * | 2016-12-02 | 2017-05-10 | 中国联合网络通信集团有限公司 | Service authentication method and authentication capability opening server |
CN106886707A (en) * | 2017-03-21 | 2017-06-23 | 广东网金控股股份有限公司 | A kind of method and device of image authentication |
US9794265B1 (en) * | 2015-03-16 | 2017-10-17 | Wells Fargo Bank, N.A. | Authentication and authorization without the use of supplicants |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104811438B (en) * | 2015-03-26 | 2018-01-23 | 网宿科技股份有限公司 | Asynchronous anti-stealing link method and system based on scheduling system |
-
2018
- 2018-09-27 CN CN201811129593.6A patent/CN109379344B/en active Active
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9379896B1 (en) * | 2011-10-24 | 2016-06-28 | Google Inc. | Compromised password mitigation |
CN104253818A (en) * | 2011-12-13 | 2014-12-31 | 华为终端有限公司 | Server and terminal authentication method, server, terminal |
CN105790943A (en) * | 2014-12-22 | 2016-07-20 | 中兴通讯股份有限公司 | License pre-authentication method, device and system |
US9794265B1 (en) * | 2015-03-16 | 2017-10-17 | Wells Fargo Bank, N.A. | Authentication and authorization without the use of supplicants |
CN105184133A (en) * | 2015-07-30 | 2015-12-23 | 广东欧珀移动通信有限公司 | Authentication method and apparatus, and corresponding mobile terminal |
CN105357190A (en) * | 2015-10-26 | 2016-02-24 | 网宿科技股份有限公司 | Method and system for performing authentication on access request |
CN106657034A (en) * | 2016-12-02 | 2017-05-10 | 中国联合网络通信集团有限公司 | Service authentication method and authentication capability opening server |
CN106886707A (en) * | 2017-03-21 | 2017-06-23 | 广东网金控股股份有限公司 | A kind of method and device of image authentication |
Also Published As
Publication number | Publication date |
---|---|
CN109379344A (en) | 2019-02-22 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108989263B (en) | Short message verification code attack protection method, server and computer readable storage medium | |
US9130918B2 (en) | System and method for automatically verifying storage of redundant contents into communication equipments, by data comparison | |
CN108259502B (en) | Authentication method for obtaining interface access authority, server and storage medium | |
US6980796B1 (en) | Method and system for verifying the authenticity of a first communication participants in a communications network | |
CN110213276B (en) | Authorization verification method under micro-service architecture, server, terminal and medium | |
CN107295116B (en) | Domain name resolution method, device and system | |
CN109391686B (en) | Processing method of access request and CDN node server | |
CN109873819B (en) | Method and system for preventing illegal access to server | |
CN104092647A (en) | Network access method, system and client | |
CN106936600B (en) | Flow charging method and system and related equipment | |
CN110912689A (en) | Method and system for generating and verifying unique value | |
CN106209727B (en) | Session access method and device | |
CN113536250B (en) | Token generation method, login verification method and related equipment | |
CN109379344B (en) | Authentication method and authentication server for access request | |
CN105722072A (en) | Business authorization method, device, system and router | |
CN102006296B (en) | Security certification method and equipment | |
CN112804222B (en) | Data transmission method, device, equipment and storage medium based on cloud deployment | |
CN107770183B (en) | Data transmission method and device | |
CN111988644B (en) | Anti-stealing-link method, device, equipment and storage medium for network video | |
US20080260154A1 (en) | Method and system for protecting the internet access of a mobile telephone, and corresponding mobile telephone and terminal | |
CN105100030B (en) | Access control method, system and device | |
EP3313039A1 (en) | Home gateway, communication management method and communication system thereof | |
CN111835504A (en) | Identification code generation method and server | |
CN112134884B (en) | Message serial number updating method | |
CN112995098B (en) | Authentication method, electronic device and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |