Supercharge Your Innovation With Domain-Expert AI Agents!

Access method of distributed internet

An access method and Internet technology, applied in the field of distributed Internet access based on password two-way authentication, can solve the problems of wasting bandwidth, reducing query efficiency, increasing server burden, etc., to improve system stability, improve query efficiency, The effect of reducing the load on the server

Active Publication Date: 2013-07-17
香港城市大学深圳研究院
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] 1 Concentrating queries on one server will waste a lot of bandwidth, increase the burden on the server, increase the number of mapping entries in NAT, and reduce query efficiency;
[0007] 2. If the main server encounters a network interruption, the entire query service will fail;
[0008] 3 The query server is vulnerable to attacks from illegal terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access method of distributed internet
  • Access method of distributed internet
  • Access method of distributed internet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] figure 1 It is a topological structure diagram of the distributed Internet access network proposed by the present invention. In the present invention:

[0036] Proxy Server refers to a proxy server. Server A and Server B are the target servers.

[0037] PG_A, PG_B, PG_C, and PG_D refer to terminals on a private network or a public network, respectively.

[0038] The STUN server is used for firewall penetration, so that terminals can learn their public network address, the NAT type of the network they are in, and the port of the public network egress.

[0039] NAT refers to Network Address Translation.

[0040] Detecting the NAT type of the network means that by sending a request packet to the STUN server with a public network IP address, the terminal judges the NAT type of the current private network it is in according to the message IP address and port returned by the STUN server.

[0041] Legal terminals mean that no matter these terminals are inside the private ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access method of a distributed internet based on word command two-way authentication. The method comprises the following steps of: detecting NAT (Network Address Translator) types of the internet in which the terminal is positioned by using a plurality of servers; then requesting a query server list from a proxy server; and finally, transmitting an authentication requestto a query server and acquiring public network IP (Internet Protocol) and ports of terminals, which are registered in the current query server after the authentication is successful, thereby finishing the access process. According to the method, the burden of the servers is reduced and the query efficiency and the stability of the system are improved by adopting a distributed query scheme. In addition, the invention can prevent the query servers from being attacked by illegal terminals.

Description

technical field [0001] The invention relates to the technology in the field of network communication, in particular to a distributed Internet access method based on password bidirectional authentication. Background technique [0002] The widespread popularization of Internet technology has led to a shortage of public network IP addresses, especially the shortage of Class C addresses. At present, the allocation of IP addresses mainly includes two methods: one is the way of dial-up Internet access. When home terminals use ADSL dial-up Internet access, China Telecom dynamically allocates public network IP addresses for such terminals; the second way is to allocate fixed public IP addresses. Network IP address, this method is mainly used in enterprises. But either way, the limited class C public network IP address resources cannot meet the needs of terminals. Therefore, in order to solve this problem, it is necessary to convert the existing network addresses. [0003] Network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/08H04L29/06H04L29/12
Inventor 贾维嘉张历卓沈平周磊
Owner 香港城市大学深圳研究院
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More