Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and apparatus for detecting proxy network access

A proxy device and web page request technology, applied in the field of data communication, can solve problems such as inaccurate identification of proxy access methods, difficulty in installing and promoting clients, compatibility issues of antivirus software, etc., and achieve good online experience, easy deployment and The effect of promotion, easy upgrade and maintenance

Active Publication Date: 2017-05-31
RUIJIE NETWORKS CO LTD
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] 1. The client program needs to be installed. It is very difficult to promote the installation of the client, and it has to face compatibility issues with different desktop systems, mobile terminals and various anti-virus software, and the maintenance cost is high;
[0009] 2. Using flash cookie technology, you will face the problem of multiple browsers and browser compatibility modes on the same host, which will cause one host to be recognized as more than two hosts, but now on the same host, It is too common to install several browsers, so the misjudgment rate is high; 3. There are other techniques for collecting fingerprint data of packets, such as the number of TCP connections, the number of DNS requests, and the ID loopback time of IP packets. Problems with large individual differences, high false alarm rate, difficult management and maintenance, etc.
[0010] 4. The requirements for network administrators are high. In the method of statistical message characteristics, it is necessary to set a judgment threshold, and the selection of this threshold requires very rich experience in network maintenance;
[0011] Therefore, in the prior art, the method for identifying the proxy to access the Internet is either inaccurate, or the client needs to be installed. It is necessary to provide a method for detecting the proxy to access the Internet that can improve accuracy and is easy to deploy and implement.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and apparatus for detecting proxy network access
  • Method and apparatus for detecting proxy network access
  • Method and apparatus for detecting proxy network access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0058] The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only a part of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0059] The system structure diagram of the embodiment of the present invention is as follows figure 1 As shown, proxy terminals (such as PCs, mobile terminals, etc.) access the egress gateway (such as egress gateway routers, etc.) through proxy devices (such as wireless routers, etc.) to access the Internet, while non-proxy terminals (such as PCs, mobile terminals, etc.) do not have access to the Internet. Access the Internet through ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a method for detecting proxy network access. The method comprises the following steps: establishing a proxy device identifier table in advance; receiving a Web webpage request message sent by a first user terminal after establishing a TCP connection with a Web server; feeding back a message used for detecting identification information of the user terminal to the first user terminal according to terminal type information in the Web webpage request message; receiving a message containing the identification information of the first user terminal sent by the first user terminal; when the source IP address of the message containing the identification information of the first user terminal is in the proxy device identifier table, determining whether the user terminal is a user terminal that surf the Internet through a proxy device according to the identification information of the first user terminal and the proxy device identifier table. Meanwhile, the invention further provides an apparatus for detecting proxy network access. According to the method and apparatus provided by the embodiment of the invention, the false alarm rate is low, and the network access experience of users is good.

Description

technical field [0001] The invention belongs to the technical field of data communication, and in particular relates to a method and a device for detecting proxy Internet access. Background technique [0002] Proxy Internet access refers to the technology of using routers or proxy software to achieve Internet access for multiple people to share an IP address, commonly known as "one drag N". The most common is that multiple terminals use a router to proxy the Internet, or a proxy server or network address translation software is installed on a host. In this case, multiple users can share the same account to access the Internet, thus bypassing the operator's account billing model, causing damage to the operator's interests, and ultimately affecting the normal construction of the network. In addition, when online violence, publishing illegal remarks, uploading pornographic videos and other illegal and illegal acts occur, the network supervision department cannot trace the sour...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/26H04L29/08
CPCH04L43/50H04L67/02
Inventor 姚尚平
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products