Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Confusion communication method based on protocol, client terminal, server and storage medium

A technology of client terminal and communication method, which is applied in the direction of digital transmission system, data exchange network, electrical components, etc., and can solve the problems of wrong interception of application or service by DPI system, low flexibility and applicability, etc.

Active Publication Date: 2021-03-26
BEIJING TOPSEC NETWORK SECURITY TECH +2
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the embodiment of this application is to provide a protocol-based confusing communication method, client terminal, server, and storage medium, which are used to solve the problem of application or service errors caused by the DPI system. The problem of interception, at the same time, overcome the shortcomings of low flexibility and applicability caused by proxying and confusion for only one protocol in the existing misinterception solution

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Confusion communication method based on protocol, client terminal, server and storage medium
  • Confusion communication method based on protocol, client terminal, server and storage medium
  • Confusion communication method based on protocol, client terminal, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] see figure 1 , figure 1 It is a schematic flowchart of a protocol-based obfuscated communication method disclosed in an embodiment of the present application, where the method is applied to a client terminal. Such as figure 1 As shown, the method of the embodiment of the present application includes steps:

[0060] 101. Send a detection message to the server based on the alternative transport layer protocol, so that the server responds to the detection message and establishes a communication connection with the server based on the alternative transport layer protocol;

[0061] 102. Send a data communication negotiation request to the server, where the data communication negotiation request is used to determine the data encryption and decryption strategy, data compression strategy, and obfuscation strategy required for the communication connection with the server;

[0062] 103. Perform data processing on target application traffic according to data encryption and decr...

Embodiment 2

[0087] see figure 2 , figure 2 It is a schematic flowchart of a protocol-based obfuscated communication method disclosed in the embodiment of this application. Wherein, the method of the embodiment of the present application is applied to the server, and the method of the embodiment of the present application includes steps:

[0088] 201. Receive the detection message sent by the client terminal based on the alternative transport layer protocol;

[0089] 202. Respond to the detection message, and establish a communication connection with the client terminal based on an alternative transport layer protocol;

[0090] 203. Receive a data communication negotiation request sent by the client terminal, where the data communication negotiation request is used to determine the data encryption and decryption strategy, data compression strategy, and obfuscation strategy required for the communication connection with the server;

[0091] 204. Receive the target application traffic s...

Embodiment 3

[0106] see image 3 , image 3 It is a schematic structural diagram of a client terminal disclosed in the embodiment of this application. Such as image 3 As shown, the client terminal of the embodiment of the present application includes:

[0107] Processor 301;

[0108] The memory 302 is configured to store machine-readable instructions, and when the instructions are executed by the processor, execute the protocol-based obfuscated communication method according to Embodiment 1 of the present application.

[0109] In the embodiment of the present application, the client terminal can detect the transport layer protocol applicable to the server with the server, and then match the transport layer protocol of the server and establish a communication connection with the server. In this way, the client terminal can communicate with the server based on different transport layer protocols. Communication connections, and then support the proxy and confusion of multiple transport l...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a confusion communication method based on a protocol, a client terminal, a server and a storage medium, and the method comprises the steps: transmitting a detection message to the server based on an alternative transmission layer protocol, so that the server builds the communication connection with the server based on the alternative transmission layer protocol; sending a data communication negotiation request to a server, wherein the data communication negotiation request is used for determining a data encryption and decryption strategy, a data compression strategy andan confusion strategy required by communication connection with the server; performing data processing on the target application traffic according to the data encryption and decryption strategy, the data compression strategy and the confusion strategy; and sending the target application traffic subjected to the data processing to the server, so that the server returns response data. According to the method and the device, the problem that the DPI system mistakenly intercepts the application or the service can be solved, and meanwhile, the defect of low flexible applicability caused by agency and confusion only for one protocol in an existing mistaken interception solution is overcome.

Description

technical field [0001] The present application relates to the technical field of computer communication, in particular, to a protocol-based obfuscated communication method, a client terminal, a server, and a storage medium. Background technique [0002] The DPI system is widely used to deploy at the entrance and exit of enterprises and operators to monitor network activities. For example, enterprises usually use DPI systems to control IM, P2P, and video services on the intranet, while operators usually use DPI systems to monitor network activities. Accounting control for application or service traffic. [0003] However, the DPI system will intercept the traffic of certain applications or services that need to be passed, resulting in the unavailability of such applications or services. At present, in order to solve this problem, one way of the existing technology is to perform proxy access based on specific protocols, for example, based on HTTP, FTP, SSL proxy, by providing ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/26
CPCH04L63/0428H04L69/24H04L43/028
Inventor 张首斌薛智慧
Owner BEIJING TOPSEC NETWORK SECURITY TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products