Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method and authentication server of access request

An access request and authentication algorithm technology, applied in the field of data processing, can solve the problems of high misjudgment and low flexibility, and achieve the effect of high security, not easy to be forged, and reducing misjudgment

Active Publication Date: 2019-02-22
CHINANETCENT TECH
View PDF9 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the inventors have found at least the following problems in the prior art: after the authentication server of the client receives a resource access request, no matter what type of resource the resource access request is about to access, it uses the same algorithm to access the resource. Request a legality check to complete the authentication (this algorithm is to check the validity of a specific parameter in a resource access request in the form of a URL, if the specific parameter is legal, the access request is authenticated), and the misjudgment is high And the flexibility is low, there is a risk of hotlinking and forgery

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and authentication server of access request
  • Authentication method and authentication server of access request
  • Authentication method and authentication server of access request

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, various implementation modes of the present invention will be described in detail below in conjunction with the accompanying drawings. However, those of ordinary skill in the art can understand that, in each implementation manner of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following implementation modes, the technical solution claimed in this application can also be realized.

[0027] The first embodiment of the present invention relates to an access request authentication method, which is applied to an authentication server, such as figure 1 As shown, the authentication methods for access requests include:

[0028] Step 101, receiving an authentication request from a CDN node ser...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the technical field of the data processing, and discloses an authentication method and authentication server of an access request. The authentication methodof the access request disclosed by the embodiment of the invention is applied to an authentication server, and comprises the following steps: receiving an authentication request from a CDN node server, determining a corresponding authentication algorithm type according to the authentication request; authenticating the authentication request according to the determined authentication algorithm typecorresponding to the authentication request, and generating an authentication result; and sending the authentication result to the CDN node server so that the CDN node server can make response on a resource access request of a user terminal according to the authentication result. Through the authentication method disclosed by the embodiment of the invention, the authentication accuracy and security are improved, the misjudgment is greatly reduced, and the authentication is hard to be counterfeited.

Description

technical field [0001] The embodiment of the present invention relates to the technical field of data processing, and in particular to an authentication method and an authentication server for an access request. Background technique [0002] The development of streaming media technology has provided users with great convenience, enabling users to obtain rich streaming media resources, but the hotlinking behavior of hotlinkers has seriously infringed on the interests of streaming media resource providers, that is, hotlinkers will be on their own websites. Place resources of other resource providers on the network, and steal resources on the resource provider’s server through illegal links, resulting in the resource provider’s bandwidth resources being exhausted or server crashes, etc. Therefore, service providers use a variety of anti-theft solutions to identify hotlinks request, deny access to hotlink requests, so as to effectively combat hotlink behavior. [0003] Currentl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08H04L63/10
Inventor 江先禄李静刘伟洪
Owner CHINANETCENT TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products