Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for performing authentication on access request

An access request and authentication technology, applied in the computer field, can solve the problem of heavy load on the authentication server

Active Publication Date: 2016-02-24
CHINANETCENT TECH
View PDF6 Cites 25 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The embodiment of the present invention provides a method and system for access request authentication, to at least solve the problem that the existing back-to-source authentication anti-leech method only relies on the authentication server to identify the hotlink request in any case, resulting in Technical problem with excessive load on the authentication server

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for performing authentication on access request
  • Method and system for performing authentication on access request
  • Method and system for performing authentication on access request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0021] According to an embodiment of the present invention, an embodiment of a method for access request authentication is provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, Also, although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0022] figure 1 is a flow chart of a method for access request authentication according to an embodiment of the present invention, such as figure 1 As shown, the method includes the following steps:

[0023] In step S12, the CDN server receives the access request from the access terminal, where the access request includes at least a first identifier for identifying the access request.

[0024] Specifically, in this solution, the above-mentioned access request may be a URL request, and the above-m...

Embodiment 2

[0080] The embodiment of the present invention also provides a system for access request authentication, which can be used to implement the method of the first embodiment above, such as Figure 4 As shown, the system may include: a client 20 , a CDN server 22 and an authentication server 24 .

[0081] The client 20 is configured to send an access request of the access terminal, where the access request is at least used to identify a first identifier of the access request.

[0082] The CDN server 22 is used to receive the access request. If the first identifier is found in the local cache of the CDN server, the CDN server locally authenticates the access request. If the first identifier is not found in the local cache of the CDN server, The CDN server forwards the access request, wherein the authentication is used to determine the legitimacy of the access request.

[0083] Specifically, in this solution, the above-mentioned access request may be a URL request, and the above-me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and system for performing authentication on an access request. The method comprises the following steps: receiving an access request of an access terminal by a CDN (Content Distribution Network) server, wherein the access request at least comprises a first identification used for identifying the access request; if the first identification is inquired in a local cache of the CDN server, then performing authentication on the access request locally by the CDN server, wherein authentication is used for determining the legality of the access request; and if the first identification is not inquired in the local cache of the CDN server, then transmitting the access request to an authentication server to perform authentication by the CDN server. The method and system for performing authentication on the access request provided by the invention solve the technical problem that an anti-stealing link method of the existing back to the source authentication only depends on the authentication server to recognize a hotlinking request in any case, so that the load of the authentication server is excessive.

Description

technical field [0001] The present invention relates to the computer field, in particular to a method and system for access request authentication. Background technique [0002] With the development of streaming media technology, hotlinking behavior of streaming media is becoming more and more rampant, and the means are becoming more and more sophisticated. Hotlinkers place video resources of other streaming media manufacturers on their own websites to steal video copyrights of regular manufacturers. This behavior will not only cause copyright infringement, but also cause problems such as bandwidth resource exhaustion and server crashes. Video service providers Often methods such as back-to-source authentication and embedding processing modules in the player are used to identify hotlinking requests, and then deny access to hotlinking requests. [0003] It should be noted that the above-mentioned existing anti-leech solutions often have the following problems: [0004] (1) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 洪珂林基宏
Owner CHINANETCENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products