Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

IP address verification method and device

An IP address and verification method technology, applied in the field of IP address verification, can solve problems such as insecurity, poor security, and easy leakage of user resource information, and achieve the effect of improving query efficiency and ensuring security

Pending Publication Date: 2021-12-31
BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At the same time, if the user and the cloud key information are leaked, there is still the possibility of insecurity, and the cloud black product database is generally shared by multiple user companies. The above query method will make the user resource information to be queried by the user company easy to leak. poor security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • IP address verification method and device
  • IP address verification method and device
  • IP address verification method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions of the present invention will be clearly and completely described below in conjunction with the accompanying drawings. Obviously, the described embodiments are part of the embodiments of the present invention, not all of them. the embodiment. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0042] With the rapid development of 5G communication technology, various terminal devices for communication emerge in endlessly. In addition to the familiar computer and mobile phones, there are also a number of Internet of Things devices, such as sweeping robots, smart speakers, smart door locks, and self-driving cars. wait. Among them, there is a unique address IP in network spac...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an IP address verification method and device, and relates to the field of network security, and the method comprises the steps: encrypting a target IP address according to a Hash algorithm, and obtaining a first Hash value; sending the first hash value to a cloud server, so that the first hash value is matched with a second hash value in a cloud black production library in the cloud server; receiving a first hash value returned by the cloud server and a label attribute and a risk value which are obtained by matching and correspond to the target IP address; and verifying the target IP address corresponding to the first hash value based on the tag attribute and the risk value, wherein the process ensures the security of the to-be-queried IP address, risks such as stealing, loss, tampering and hijacking can be prevented, and the query efficiency is greatly improved.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to an IP address verification method and device. Background technique [0002] In recent years, link resources and IP resources in cyberspace have become an important link in the black and gray production chain. Black and gray industry operators use a large number of IPs to carry out attacks that endanger network security, such as DDOS, credentialing, etc.; they can also use counterfeit IPs to conduct network fraud, such as collecting wool when logging in to registration activities, grabbing scalpers, and being crawled by crawlers. Data, account hacking, second-dial fraud, etc.; cause serious harm to IOT, e-commerce, finance, ticketing platforms, etc., and cause huge economic losses to enterprises. [0003] Currently, the user transfers the IP to the cloud black product database to query the risk label through the API call query method, and obtains the IP risk value and ri...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/06H04L9/32
CPCH04L63/1466H04L9/0643H04L9/3236
Inventor 王琪
Owner BEIJING KINGSOFT CLOUD NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products