Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe and rapid anonymous network communication method and system

An anonymous network and communication system technology, applied in the field of safe and fast anonymous network communication methods and systems, can solve problems such as poor stability of communication links, weak security, and reduced availability of anonymous communication systems, so as to ensure legitimacy and improve security. sexual effect

Active Publication Date: 2016-02-03
XIAMEN ANSCEN NETWORK TECH CO LTD
View PDF4 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the stability of the communication link is poor, the path of the link communication is random, one-way transmission cannot be realized, and the communication port is fixed, which reduces the availability of the anonymous communication system for different needs to a certain extent. Resources adhere to the idea that I am for everyone and everyone is for me, which is not suitable for building a credible and fast anonymous network system
[0004] At present, anonymous communications based on small areas are mostly realized through Tor or multi-hop VPN. Tor network stability is poor, transmission speed is slow, and communication links cannot be specified. It depends on the automatic planning of directory server subnetwork resources and cannot realize one-way transmission. , it is not suitable for ordinary users who want to build a controllable anonymous communication system
The multi-hop VPN communication link is directional, the construction is cumbersome, the characteristics of the network outer layer protocol are obvious, the difficulty of reverse tracking is relatively low, and at the same time, it is impossible to achieve multi-directional confusing traffic and other issues, and its security is also weak

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe and rapid anonymous network communication method and system
  • Safe and rapid anonymous network communication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] To further illustrate the various embodiments, the present invention is provided with accompanying drawings. These drawings are a part of the disclosure of the present invention, which are mainly used to illustrate the embodiments, and can be combined with related descriptions in the specification to explain the operating principles of the embodiments. With reference to these contents, those skilled in the art should understand other possible implementations and advantages of the present invention. Components in the figures are not drawn to scale, and similar component symbols are generally used to denote similar components.

[0031] Now in conjunction with accompanying drawing and specific embodiment the present invention is further described, as figure 1 As shown, a safe and fast anonymous network communication system of the present invention includes a control center, a monitoring center, a security gateway, an Internet access device and a cluster of repeaters. The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the technical field of network security communications, and particularly relates to a safe and rapid anonymous network communication method and system. According to the method, random change of a communication port and branching and converging functions of a communication link are realized according to a thought based on UDP (User Datagram Protocol) penetration, so that a large confusion flow can be generated in a small system; a function similar to a P2P acceleration function is realized; and a one-way transmission can be performed. In the system, uniform centralized authorization management is adopted for all system network resources, so that access of illegal third-party resources is prevented. A type A communication is adopted between a control center and Internet access equipment, so that the security of the control center is ensured effectively. A mobile monitoring center is deployed movably, and actively detects a state of a relay server, so that large-area node exposure caused by malicious node exposure is effectively avoided.

Description

technical field [0001] The invention belongs to the technical field of network security communication, and in particular relates to a safe and fast anonymous network communication method and system. Background technique [0002] With the development of computer network communication technology, the network has penetrated into personal life and business behavior, such as personal social applications, personal online payment, company business communication, etc., so the issue of network communication security has become more and more important. For this reason, the vast number of network communication technicians have begun to use traditional information encryption methods such as VPN and TBSG to realize encrypted communication of information, which guarantees the security of communication data of most network applications to a certain extent, but cannot hide the communication between the two parties. relation. So how to hide the relationship between the two parties in commun...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0421H04L63/0884H04L63/0892H04L63/205H04L69/164
Inventor 姚先洪尹声高静峰罗佳张婷
Owner XIAMEN ANSCEN NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products