Agent Internet identification method, computer device and computer-readable storage medium
An identification method and counting value technology, applied in the field of computer networks, can solve problems such as key connections cannot be identified
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0042] It should be understood that the specific embodiments described herein are only used to explain the present invention, but not to limit the present invention.
[0043] Please refer to figure 1 and figure 2 , figure 1 It is a method flow chart of the method 100 for identifying the proxy surfing the Internet in the first embodiment of the present invention, figure 2 It is a schematic diagram of the module structure of the computer device 110 applying the method 100 for identifying the proxy surfing the Internet.
[0044] The proxy surfing identification method 100 is applied to a computer device 110 connected to the Internet, and the computer device 110 can access Internet sites or perform data interaction through the Internet. Wherein, the proxy surfing identification method 100 includes the following steps:
[0045] Step S10, sequentially acquiring data packets generated by the Internet connection established by the user.
[0046]It should be noted that, when a u...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


