Method and system for silent hiding network transmission

A technology of network transmission and data transmission, applied in the direction of transmission system, electrical components, etc., can solve the problem that network data cannot pass normally and cannot meet the needs well.

Inactive Publication Date: 2008-11-19
RUN TECH CO LTD BEIJING
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

(3) The transmitted data must pass through hardware firewalls, intrusion detection systems and other monitoring and filtering devices in the network, and when the monitoring conditions of these devices are set relatively harsh, some special network data cannot pass through normally
In view of the network transmission requirements in the above special circumstances, the traditional network communication mode can no longer meet the needs well

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for silent hiding network transmission
  • Method and system for silent hiding network transmission
  • Method and system for silent hiding network transmission

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] Below in conjunction with accompanying drawing and specific embodiment the present invention is described in further detail:

[0070] (1) The specific communication process of silent and concealed network transmission equipment

[0071] In this implementation process, the sender device sends a file to the receiver device, and the protocol uses the GhostTrans protocol as an example to illustrate the specific implementation of the device, such as image 3 structure diagram and Figure 4 Flow chart of sending data.

[0072] 1. Start the GhostTrans receiving device at the receiving end (such as image 3 Middle ④), the GhostTrans receiving end device starts to monitor all data packets that the receiving end computer receives, and this specific embodiment adopts the monitoring mode of the original socket technology, as Figure 4 shown.

[0073] 2. When sending files to the receiving end, start the GhostTrans sending device at the sending end (such as image 3 Middle ⑤). ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a silent and invisible network transmission method and a system, which belong to the computer network communication technical field; the method defines the communication protocol which satifies the characteristics as the followings: the header feature code is used for distinguishing from other protocols; the type is used for identifying the data packet; the serial number is used for recoding the data packet; the sending device in the sender end selects the port with opened receiving end as the destination port and loads the sent data; a , a and a are sequentially constructed and sent to the receiver end; the receiver end snoops the data packets received from the ports and analyzes the acquired data packets to recover the data packets to raw data. The network transmission method and the system has the advantages of multiplexing general port, one-side data-sending, enabling the receiver device to be in the silent mode, uneasy discovering of the existence of the receiver device and preventing the monitoring devices from noticing the data transmission in the network.

Description

technical field [0001] The invention belongs to the field of computer communication, in particular to the field of data transmission in the field of computer network communication. Background technique [0002] For the traditional network communication technology, the sender is used to send data to the specified port in the specified address, and the receiver opens the predetermined port to prepare to receive the sent data. After the receiver confirms that the data is successfully received, it sends The process by which a party sends back an acknowledgment packet that the sent data has been received. When using this communication technology, multiple communication software on the same computer independently receive and send data without any connection with each other. figure 2 shown. For most computer network communication situations, this communication technology mode can meet the requirements. However, for some special network communication fields, the use of this commu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 安丙春
Owner RUN TECH CO LTD BEIJING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products