Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method for querying real MAC address corresponding to IP through IP by spanning networks

A technology of MAC address and IP address, applied in the field of computer information security auditing device

Inactive Publication Date: 2010-01-20
上海百络信息技术有限公司
View PDF1 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, it has not been solved in these existing technologies. The computer information security auditing system or the computer information filtering system obtains the real MAC address corresponding to the data packet according to the intercepted data packet.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for querying real MAC address corresponding to IP through IP by spanning networks
  • Method for querying real MAC address corresponding to IP through IP by spanning networks

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Such as figure 1 As shown, the method for querying the real MAC address corresponding to the IP address across the network through IP includes the steps of: obtaining a data packet through the network host A, and parsing the IP address from the data packet; querying the IP address corresponding to this IP address. Calculate the IP address and mask of the computer to see whether it is the data of the same VLAN; if the detection result is yes, then directly query the real MAC address through ARP or NETBIOS; to check whether it is, how to use NETBIOS or SNMP to see if it can be queried Corresponding to the MAC address, if the MAC address cannot be queried, then find one or more hosts B in the VLAN corresponding to the IP, and install a detection program; after the detection program is installed, query the real MAC address of the IP through ARP or NETBIOS, and get the query result , to send the data to host A.

[0020] Such as figure 1 Shown, computer information security...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for querying a real MAC address corresponding to an IP through the IP by spanning networks, which comprises the following steps that: a host computer A acquires a network data packet through the Ethernet; an IP address needing acquiring an MAC address is extracted from the data packet; whether the extracted IP address is in the same VLAN as the host computer A or not is detected, and if the extracted IP address is in the same VLAN as the host computer A, an ARP or NETBIOS request is transmitted to the IP address to query the MAC address of the IP address; and the host computer A files the acquired MAC address and then the flow is ended. Compared with the prior art, the method can not only enable computer information security auditing systems or computer information filtering systems to restore data above the IP in the data packet, but also help the systems to acquire real MAC addresses.

Description

technical field [0001] The invention relates to a computer information security auditing device or a computer information filtering device, in particular to a method for inquiring its corresponding real MAC address across a network through IP. Background technique [0002] In the computer information security audit system or computer information filtering system, it has become a basic technology to obtain and restore the data transmitted by the host in the network through the network, and record the network behavior of the computer. However, because the data packet passes through the gateway, the real MAC address is modified to be the external MAC address of the gateway, resulting in distortion of the MAC address. [0003] Related technologies related to computer information security auditing system or computer information filtering system or MAC address have been disclosed in Chinese patents 01139038, 200410055221, and 200610109851. However, these existing technologies hav...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12
Inventor 胡国中彭春莲
Owner 上海百络信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products