Unlock instant, AI-driven research and patent intelligence for your innovation.

Anonymous Internet devices and systems

A device and access device technology, applied in the field of communications, can solve the problems of real IP leakage, privacy leakage, and high Tor professional level requirements, and achieve the effect of reducing difficulty, improving security, and avoiding interference.

Active Publication Date: 2020-04-07
BEIJING KNOWNSEC INFORMATION TECH
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, users usually run the Tor (The OnionRouter) client on Internet devices (such as computers, mobile phones, etc.) to achieve anonymous Internet access, but the installation and configuration of Tor requires a high level of expertise, and most ordinary users cannot successfully run Tor.
In addition, some protocols may reveal the real IP, such as the BT protocol commonly used by users to download and upload, etc. However, since Tor itself does not shield various protocols, there is still a risk of privacy leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous Internet devices and systems
  • Anonymous Internet devices and systems
  • Anonymous Internet devices and systems

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are some of the embodiments of the present invention, but not all of them. The components of the embodiments of the invention generally described and illustrated in the figures herein may be arranged and designed in a variety of different configurations.

[0029] Accordingly, the following detailed description of the embodiments of the invention provided in the accompanying drawings is not intended to limit the scope of the claimed invention, but merely represents selected embodiments of the invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0030] It should be not...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides an anonymous Internet surfing device and an anonymous Internet surfing system. The anonymous Internet surfing device comprises a first network interface, a second network interface, a processing apparatus and a hardware switching circuit, wherein the first network interface, the second network interface and the hardware switching circuit are respectively inelectrical connection with the processing apparatus, the first network interface is electrically connected with the Internet surfing device through a physical network cable, and the second network interface is electrically connected with a network port through the physical network cable. The processing apparatus is used for monitoring data packets entering from the first network interface, and when detecting that a circuit state of the hardware switching circuit is a first circuit state, generating a Tor node path where the generated data packets need to pass through and which is composed ofTor nodes, and sending the data packets to a destination address from the second network interface based on the Tor node path when the Tor node path satisfies a preset safety rule. Thereby, difficultyof surfing the Internet anonymously through the Tor is reduced for a normal user, meanwhile, data packets which may leak a real IP in a process of using the Tor are filtered, and safety of surfing the Internet anonymously is improved.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to an anonymous Internet access device and system. Background technique [0002] At present, users usually run the Tor (The OnionRouter) client on Internet devices (such as computers, mobile phones, etc.) to achieve anonymous Internet access, but the installation and configuration of Tor requires a high level of expertise, and most ordinary users cannot successfully run Tor. . In addition, some protocols may reveal the real IP, such as the BT protocol download and upload commonly used by users, but since Tor itself does not shield various protocols, there is still a risk of privacy leakage. Contents of the invention [0003] In order to overcome the above-mentioned deficiencies in the prior art, the purpose of the present invention is to provide an anonymous Internet access device and system, which can reduce the difficulty for ordinary users to use Tor to access the Inter...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0236H04L63/0245H04L63/0263H04L63/0421H04L63/10
Inventor 付鹏飞田春燕胡铭德何丰宇孙浩然
Owner BEIJING KNOWNSEC INFORMATION TECH