Unlock instant, AI-driven research and patent intelligence for your innovation.

Addressing method and device based on Internet-based regional characteristics

An Internet, characteristic technology, applied in the field of network security, can solve the problems of invisible, nodes invisible to users, unable to know access anonymity and security, etc., to achieve the effect of improving security

Active Publication Date: 2021-10-15
北京华云安信息技术有限公司
View PDF9 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in these methods, the nodes that the traffic passes through are random, and the nodes are invisible to users. Users cannot know which countries their traffic passes through, let alone control the countries through which traffic flows according to the user's wishes, resulting in some conflicts with the political system. Relevant sensitive information will have a corresponding national flow
[0003] The existing Tor or I2P network is a network shared by the global Internet, which is invisible to users. Which area and how many nodes the user's traffic flows through are completely invisible and uncontrollable to the user, and cannot be adjusted according to the user's own wishes. Therefore, users have no way of knowing whether their visits are really anonymous and safe

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Addressing method and device based on Internet-based regional characteristics
  • Addressing method and device based on Internet-based regional characteristics
  • Addressing method and device based on Internet-based regional characteristics

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the purpose, technical solutions and advantages of the embodiments of the present disclosure clearer, the technical solutions in the embodiments of the present disclosure will be clearly and completely described below in conjunction with the drawings in the embodiments of the present disclosure. Obviously, the described embodiments It is a part of the embodiments of the present disclosure, but not all of them. Based on the embodiments in the present disclosure, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present disclosure.

[0036] In addition, the term "and / or" in this article is only an association relationship describing associated objects, which means that there may be three relationships, for example, A and / or B, which may mean: A exists alone, A and B exist at the same time, There are three cases of B alone. In addition, the character " / " in this art...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present disclosure provides an addressing method based on an area characteristic of the Internet, which includes: receiving target area information sent by a current client, the target area information including an identifier of the target area and the number of characteristic areas to be passed; according to the target area The identifier and the number of characteristic areas to be passed through are determined according to preset rules; the addressing list is generated according to the determined characteristic areas to be passed through. In this way, when the user anonymously accesses the global Internet shared network, the area where the traffic passes is visible to the user, and the number of nodes that the traffic passes through is controllable, which improves the security of the user's anonymous access.

Description

technical field [0001] Embodiments of the present disclosure generally relate to the technical field of network security, and more specifically, relate to an addressing method and device based on Internet area characteristics. Background technique [0002] In the current global Internet environment, when Internet users access some special services or hosts, in order to prevent themselves from being discovered and tracked by the other party, they often use existing foreign secret networks, such as I2P or Tor. However, in these methods, the nodes that the traffic passes through are random, and the nodes are invisible to users. Users cannot know which countries their traffic passes through, let alone control the countries through which traffic flows according to the user's wishes, which leads to some conflicts with the political system. Relevant sensitive information will have a corresponding national flow. [0003] The existing Tor or I2P network is a network shared by the gl...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0421H04L63/20H04L63/30
Inventor 郝伟刘加瑞沈传宝吴璇
Owner 北京华云安信息技术有限公司