Data interaction method, device and system

A data interaction and data packet technology, applied in the field of data interaction, can solve the problems of data packet filtering failure and low network security, and achieve the effect of improving network security

Active Publication Date: 2019-05-14
ALIBABA GRP HLDG LTD
View PDF6 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present application provides a method, device and system for data interaction, to at least solve the technical problem of low network security caused by the ineffectiveness of data packet filtering in the prior art by calling the interface of the network card to return the packet

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data interaction method, device and system
  • Data interaction method, device and system
  • Data interaction method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] This application provides a system for data interaction. The data interaction system includes: a terminal and a server, wherein the kernel cache module in the server marks the received data packet request message, wherein the mark is a preset mark.

[0046] Specifically, the data interaction system provided by the embodiment of the present application can be applied to the DNS response method. In order to prevent DNS messages from being repeatedly processed by the system due to unmarked preset marks, and the kernel state DNS cache is intercepted by using the netfilter network framework After the request is made, the NIC interface will be called directly to return the packet after the packet is sealed, making other packet filters such as iptables invalid, making the data unusable in security verification scenarios and cloud vpc scenarios.

[0047] The preset message type provided in the data interaction system provided by the present application is a DNS message, and if ...

Embodiment 2

[0050] This application provides figure 1 The data interaction system shown. figure 1 It is a schematic structural diagram of a data interaction system according to Embodiment 2 of the present application. Including: terminal 12 and server 14, wherein,

[0051] The terminal 12 is used to send a data packet request message to the server 14; the server 14 is used to judge whether the received data packet request message carries a preset mark, and if the data packet request message does not carry a preset mark, judge whether the data packet Whether the message type of the request message is the same as the preset message type, if the message type is the same as the preset message type, mark the preset mark on the data packet request message, and return the corresponding message to the terminal 12.

[0052] Here, the preset flag carried in the data packet request message in the data interaction system provided by this application can make the data packet request message not pass...

Embodiment 3

[0079]According to the embodiment of the present application, an embodiment of a data interaction method is also provided. It should be noted that the steps shown in the flow chart of the accompanying drawings can be executed in a computer system such as a set of computer-executable instructions, and, Although a logical order is shown in the flowcharts, in some cases the steps shown or described may be performed in an order different from that shown or described herein.

[0080] The method embodiment provided in Embodiment 1 of the present application may be executed in a mobile terminal, a computer terminal, or a similar computing device. Take running on a computer terminal as an example, Figure 4 It is a block diagram of the hardware structure of the server of a method for data interaction in the embodiment of this application. Such as Figure 4 As shown, the server 40 may include one or more (only one is shown in the figure) processors 402 (the processors 402 may include...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data interaction method, device and system. The method comprises the following steps: under the condition that a data packet request message does not carry a preset mark, judging whether the message type of the data packet request message is the same as the preset message type or not; Marking a preset mark on the data packet request message under the condition that the message type is the same as the preset message type; and returning a message corresponding to the data packet request message to the terminal. The technical problem that the network security is low dueto the fact that data packet filtering fails due to the fact that a network card interface is called for packet returning in the prior art is solved.

Description

technical field [0001] The present application relates to the application field of Internet technology, in particular, to a data interaction method, device and system. Background technique [0002] The domain name system (Domain Name System, referred to as DNS) usually uses BIND to provide services in the industry. BIND is software deployed at the application layer. In order to make DNS send and receive packets faster, on the Linux server, the kernel can be used to directly provide DNS services without going through the complete kernel protocol stack, and the dev_queue_xmit function that calls the network card interface in the kernel is called to perform return package. [0003] However, after the kernel state DNS cache uses the netfilter network framework to intercept the request, it will directly call the NIC interface to return the packet after packetizing, making other packet filters such as iptables invalid, making the data unusable in security verification scenarios a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08H04L29/12
Inventor 龙卫平宋毅
Owner ALIBABA GRP HLDG LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products