A springboard network path generation method capable of autonomously configuring networking rules

A network path and springboard technology, applied in the transmission system, electrical components, etc., can solve the problems of inability to anonymity and security enhancement, inability to configure, select and adjust springboard paths, and achieve the effects of anonymity and security enhancement

Active Publication Date: 2022-03-08
北京华云安信息技术有限公司
View PDF10 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, the existing Tor network or I2P network (anonymous network) cannot configure the springboard path according to the actual needs of specific users
That is, some of the user's business cannot be selected and adjusted according to the actual situation, so that its anonymity and security cannot be further enhanced

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A springboard network path generation method capable of autonomously configuring networking rules
  • A springboard network path generation method capable of autonomously configuring networking rules
  • A springboard network path generation method capable of autonomously configuring networking rules

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the drawings in the embodiments of the present disclosure. Obviously, the described embodiments It is a part of the embodiments of the present disclosure, but not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present disclosure.

[0047] In addition, the term "and / or" in this article is only an association relationship describing associated objects, which means that there may be three relationships, for example, A and / or B, which may mean: A exists alone, A and B exist at the same time, There are three cases of B alone. In addition, the character " / " in this article ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

Embodiments of the present disclosure provide a springboard network path generation method, device and computer-readable storage medium capable of autonomously configuring networking rules. The method includes that the client sends a command to construct a network path to a central node in a different area; the central node selects a secondary node in response to the command to construct a network path; the central node sends feedback information to the client; wherein, The feedback information includes the IP address of the selected secondary node that meets the requirements; the client receives the feedback information, and constructs a springboard network path according to the feedback information. In this way, better concealment can be achieved.

Description

technical field [0001] Embodiments of the present disclosure generally relate to the technical field of network node interaction, and more specifically, relate to a springboard network path generation method, device and computer-readable storage medium capable of autonomously configuring networking rules. Background technique [0002] Since entering the new century, network attack and defense technology has developed rapidly. If the early network confrontation only stayed in a single network attack or defense, then the modern information network confrontation not only involves communication, radar, photoelectric, stealth, navigation and other network systems, but also covers space, air, ground, water surface and underwater , covering all areas of the battlefield, and has an inestimable operational "benefit ratio". [0003] In network attack and defense confrontation, in order to ensure the anonymity of the attacker, a multi-hop anonymous network is often used. Anonymous ne...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L45/00H04L67/1042
CPCH04L45/20H04L67/1044
Inventor 沈传宝郝伟
Owner 北京华云安信息技术有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products