CDN mainly improves site speed and performance by caching content at edge nodes to shorten the distance between users and websites. Some content, when you do not want to be stolen from other places, such as some content that has copyright or does not want to generate more traffic due to theft, is the core issue that most content owners consider. This is known as the security chain. In practice, the commonly used anti-theft chain methods for CDN include IP black-and-white list, referer, timestamp, and central authentication for anti-theft chain.

Introduction to Common Methods of CDN Content Anti Theft Chains

Below is a brief introduction to these methods of anti-theft chains:

1、 IP black and white list

This is relatively simple. Directly configure the requester’s IP black and white list. After setting the blacklist, all users except the blacklist can access it; Conversely, if a whitelist is set, only users on the whitelist can access it. This method is directly effective, but it is necessary to know the specific IP information of the requester, so the applicable scenarios are relatively limited.

2、 Referer anti-theft chain

During http requests, the referer records the origin of the request, so by setting the referer’s black and white list, you can control which page or domain name requests are accessible. This method is relatively simple because you know exactly which website you want or don’t want to access, but the disadvantage is that referer information can be falsified.

3、 Timestamp anti-theft chain

Timestamped anti theft chains are mainly used to add time factors to URLs by adding timestamp information to the URL request. If the thieves do not update the URL in a timely manner, they will be unable to access it. This is relatively common, but if chain thieves regularly come over to update URLs, this method will also fail.

4、 Central authentication

The method of central authentication is equivalent to adding a layer of authentication to the origin site. This method will be effective for the anti-theft chain, but it will increase the time cost of the request. It is generally used for content that has complete protection, such as some video websites that require membership to view content. For these websites, central authentication is generally performed. The above are relatively common anti-theft chain methods. Of course, you can also personalize and develop anti-theft chain methods that are suitable for your own business. Welcome to experience the Huosan Cloud Convergence CDN product and communicate and discuss with us.

相关新闻

微信

15323421841