Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Intermediate system used for distinguishing and tracing user

An intermediate system and user technology, applied in the field of network security, can solve problems such as permanent identification is not suitable for user status record index

Inactive Publication Date: 2008-08-27
SUN YAT SEN UNIV
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, due to the huge number of users, this permanent identifier is not suitable for direct use as an index for user status records

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Intermediate system used for distinguishing and tracing user
  • Intermediate system used for distinguishing and tracing user
  • Intermediate system used for distinguishing and tracing user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be further described below in conjunction with the accompanying drawings.

[0046] The structural diagram of the intermediate system for quickly and safely distinguishing and tracking users according to the present invention is shown in the attached figure 1 shown. The focus of this embodiment is to process the HTTP request packet, and for other data packets, mature technologies such as the access list control of the firewall and the abuse detection of the intrusion detection system can be used to realize the source and destination IP address, protocol, rate, etc. , process and key feature detection and filtering. After receiving and classifying data packets from the Internet, HTTP requests are separated. After the HTTP request is verified and classified by the user's short-term status and long-term identification, illegal or forged requests are filtered out, and new user requests and old user requests are passed. The old user's request pack...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention provides a technology for differentiating and tracking users quickly and securily including a user differentiating method disclosing the combination of long term labels and short term state used in recording memory management of state and a repeated usage method, a user activation method, a realization theory of the system and security measures. This invention is suitable for setting up a security recovery system at the front of a Web server or a sorting control system to realize the track and analysis to user behaviors to further realize distinguished service, rate control and filter.

Description

technical field [0001] The invention belongs to the technical field of network security, in particular to a technology for distinguishing and tracking users visiting protected Web sites. Utilizing this technology enables the network security system to control the user's access behavior in a differentiated manner. technical background [0002] The traditional method of classifying the data flow arriving at the network server is to use the source and destination IP address, port number, protocol and other elements in the data packet to distinguish, but this cannot distinguish between firewalls, proxy servers, network address translators (NAT ) behind the user. The commonly used method for tracking the user session state is to use cookies at the application layer, dynamic pages, or plug-ins (plug-ins) of the browser, etc., which can pass through firewalls, proxy servers, and address translators. The information is delivered to the user end, and the function of obtaining some ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/24H04L29/12H04L9/32
Inventor 余顺争
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products