Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Anonymous network access method, client, system, server, and medium

An anonymous network and access method technology, applied in the system, anonymous network access method, client, server and media fields, can solve the problems of easy capture and tampering of data, insecure communication methods, etc., to reduce the possibility of stealing or tampering performance, enhanced overall security and reliability, fast and secure communication

Active Publication Date: 2019-01-18
TENCENT TECH (SHENZHEN) CO LTD
View PDF9 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In order to solve the problems of insecure communication between the client and the server in the anonymous network access of the prior art, and the data transmitted in the communication are easily captured and tampered with, the present invention provides an anonymous network access method, a client , system, server and media:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Anonymous network access method, client, system, server, and medium
  • Anonymous network access method, client, system, server, and medium
  • Anonymous network access method, client, system, server, and medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0042] Example 1: Please refer to figure 2 , figure 2 It is a schematic diagram of a communication method between the client and the server provided by the embodiment of the present invention. The specific anonymous network access method is as follows: image 3 As shown, the method may include:

[0043] S301: Create a first named pipe, where the first named pipe connects the client and the server;

[0044] Such as figure 2 As shown, the user opens the Tor client, and the Tor client will create the first named pipe. Create a Pipe_C pipeline, the Pipe_C pipeline is used to transmit data to the Tor server. When the client establishes the first named pipe, it specifies a name, and the server can open the other end of the pipe through the name, and communicate with the client according to the given authority.

[0045] S302: Connect a second named pipe, the second named pipe is created by the server, and the second named pipe connects the server and the client;

[0046] Such ...

Embodiment 2

[0072] Example 2: Please refer to Figure 6 , Figure 6 It is a schematic diagram of a communication method between the client and the server provided by the embodiment of the present invention. The specific anonymous network access method is as follows: Figure 7 As shown, the method may include:

[0073] S701: Create a first memory file mapping object, where the first memory file mapping object and the second memory file mapping object created by the server point to the same memory;

[0074] After the Tor client starts, it will create a memory file mapping object named FileMappingObject, which is the first memory file mapping object, and the Tor client will then notify the Tor server to save the memory file mapping object, which is equivalent to creating a first memory file mapping object on the Tor server. Two memory file mapping objects. The two memory file mapping objects have the same name FileMappingObject and point to the same memory.

[0075] S702: Map the first m...

Embodiment 3

[0089] Example 3: Please refer to Figure 8 , Figure 8 It is a schematic diagram of a communication method between the client and the server provided by the embodiment of the present invention. The specific anonymous network access method is as follows: Figure 9 As shown, the method may include:

[0090] S901: Create a client stub code, where the client stub code communicates with the server stub code created by the server through the first network;

[0091] Using RPC (Remote Procedure Call, remote procedure call), the Tor client Stub (pile code) and the Tor server Stub are respectively used for the Tor client and the Tor server to realize the process of obtaining or sending data from the network to the network . In the process of RPC call, the client calls the service locally. After receiving the call, the client stub is responsible for assembling the method, parameters, etc. into a message body that can be transmitted over the network. The client stub finds the service ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an anonymous network access method, a client, a system, a server and a medium. The method includes the steps: creating a first named pipe which is connected with the client andthe server; connecting a second named pipe which is created by the server and is connected with the server and the client; writing request data in the first named pipe, wherein the request data is transmitted to the server through the first named pipe; reading the response data in the second named pipe, wherein the response data is transmitted by the server through the second named pipe, and theserver sends the request data to a target site to obtain response data. The method enhances the security of data between the server and the client, reduces the possibility that private data is stolenor tampered by other malicious applications. Meanwhile, the method can achieve fast and safe communication between the client and the server, and improves the overall security and reliability of accessing the target site through an anonymous network.

Description

technical field [0001] The invention relates to the technical field of Internet communication, in particular to an anonymous network access method, a client, a system, a server and a medium. Background technique [0002] With the rapid development of computer and Internet technology, the network has become more and more deeply and widely integrated into people's daily life. At the same time, the security and privacy issues brought about by network communication have also received more and more attention. Anonymous network access has become an important and effective method for protecting user privacy on the Internet. It prevents information leakage, traffic analysis, and user identity feature analysis from the network communication level to protect the communication relationship between the two parties. [0003] For example, Tor (The Onion Route, an implementation of the second-generation onion routing) is an anonymous communication system. Users can communicate anonymously...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/0421H04L63/18
Inventor 郑文选陈阳
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products