Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Authentication method based on port forwarding hypertext transfer protocol

A hypertext transmission and port technology, applied in the field of authentication and authentication based on port forwarding hypertext transmission protocol, can solve the problems of network fluctuation, high deployment cost and development cost, affecting normal network use, etc., and achieve the effect of low system consumption

Active Publication Date: 2020-05-19
华数传媒网络有限公司
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] 1. If a request for TLS encryption is encountered, unless the encryption key of the source site can be provided, the encrypted network data packet cannot be parsed
[0005] 2. Data packet capture and filtering depend on command interfaces such as tcpdump, which cannot effectively control the scope of broadcasting. If you work in a normal LAN, such a network environment will affect normal network use
[0006] 3. The equipment required for advanced monitoring solutions is very expensive, and it is difficult to customize, and the deployment cost and development cost are very high
[0007] 4. The monitor needs to be turned on in real time. If the monitor is offline, it may cause network fluctuations or even unavailability

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method based on port forwarding hypertext transfer protocol
  • Authentication method based on port forwarding hypertext transfer protocol
  • Authentication method based on port forwarding hypertext transfer protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] The present invention will be further described below in conjunction with the accompanying drawings and specific embodiments.

[0022] Such as figure 1 As shown, the authentication authentication method based on the port forwarding hypertext transfer protocol, the specific steps are as follows:

[0023] 101) Preprocessing step: establish a dynamic certificate issuing center, forward the designated IP / Mac address through iptables, and send all 80 / 443 requests of the current domain name to the router;

[0024] 102) HTTPS request judgment step: the router performs analysis and judgment after receiving the request. If the request is an HTTP request, the router will continue to monitor and decrypt the plaintext through the HTTP packet analysis tool, and send it to the end user and the server synchronously, and then enter the response step;

[0025] If the request is an HTTPS request, the certificate is generated by the dynamic certificate issuing center as needed; the rout...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method based on a port forwarding hypertext transfer protocol. The method specifically comprises the following steps: 101) a preprocessing step, 102) an HTTPSrequest judgment step, and 103) a response step. The authentication method based on the port forwarding hypertext transfer protocol is simple and reasonable in process design and low in system consumption.

Description

technical field [0001] The invention relates to the field of traffic monitoring, more specifically, it relates to an authentication authentication method based on port forwarding hypertext transfer protocol. Background technique [0002] The current traffic monitoring uses professional equipment or switches and hubs with broadcast functions to collect tcp / upd information in the LAN. Use libcap, tcpdump, and other tools to capture network data, and then further analyze the data packets in wireshark or other tools. [0003] The following problems exist: [0004] 1. If you encounter a TLS encrypted request, unless you can provide the encryption key of the source site, the encrypted network data packet cannot be parsed. [0005] 2. Data packet capture and filtering depend on command interfaces such as tcpdump, which cannot effectively control the scope of broadcasting. If you work in a normal LAN, such a network environment will affect normal network use. [0006] 3. The equi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/08H04L63/0823H04L63/0428H04L67/02H04L63/10
Inventor 袁开
Owner 华数传媒网络有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products