Unlock instant, AI-driven research and patent intelligence for your innovation.

Object tracing method and related device

An object and target object technology, applied in the computer field, can solve problems such as hidden dangers, the lack of real identity information of the target object, and the inability of the internal system of the enterprise to identify the real identity of the online target object, so as to eliminate hidden dangers and improve security.

Pending Publication Date: 2022-04-26
CHINA TELECOM CORP LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] 1. The internal system of the enterprise cannot identify the true identity of the online target;
[0006] The system log records the virtual IP address of the online target object, which does not contain the real identity information of the target object; based on the virtual IP address, the internal system of the enterprise cannot extract the real identity information of the target object, so it cannot locate the internal system of the enterprise The actual operator has potential safety hazards
[0007] 2. The internal system of the enterprise cannot identify the real identity of the offline target object
[0008] After the target object is offline, the used virtual IP address will be released, and the VPN system will reassign the virtual IP address. Therefore, there will be a situation in the system log that one virtual IP address corresponds to multiple target objects. In this way, the internal system of the enterprise cannot be based on The virtual IP address confirms the real identity information of the offline target object, so that it is impossible to locate the actual operator of the internal system of the enterprise, and there are security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Object tracing method and related device
  • Object tracing method and related device
  • Object tracing method and related device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0077] In order to make the purpose, technical solution and advantages of the embodiment of the present application more clear, the following will be combined with the drawings in the embodiment of the present application, the technical solution of the present application is clearly and completely described, obviously, the embodiment described is part of the technical solution of the present application, not all embodiments. Based on the embodiments recorded in the present application document, all other embodiments obtained by those of ordinary skill in the art without the premise of creative labor, are within the scope of the protection of the technical solution of the present application.

[0078] The following will introduce some of the concepts involved in the embodiments of the present application.

[0079] Hyper Text Transfer Protocol (HTTP) server, generally refers to a website server, refers to a program that resides on a certain type of computer on the Internet, can proc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of computers, in particular to an object tracing method and a related device, which are used for accurately identifying the real identity of an object, and the method comprises the following steps: after a client distributes a virtual IP address of a VPN system for a target object, generating corresponding object identification information in combination with object description information of the target object, and the target server can determine the real identity of the target object accessed to the target internal system based on the object description information recorded in the object identification information. Therefore, after each object accesses the target internal system, the real identity of the corresponding object can be associated and recorded for each operation executed by each object, and then the target internal system can determine the executor of each operation by calling each operation record, so that the external object is better prevented from logging in the target internal system to steal information, and the user experience is improved. And hidden dangers caused by illegal login of the external object to the internal system of the target are eliminated.

Description

Technical field [0001] The present application relates to the field of computer technology, in particular to a method of object tracing and related devices. Background [0002] Virtual Private Network (VPN), is a temporary and secure connection established through a public interconnection network, is a tunnel through the public network, using this tunnel, you can encrypt the data multiple times, so as to achieve the purpose of safe use of the Internet. [0003] The VPN system is a system that provides remote access to the enterprise's internal system for enterprise office objects to securely access the enterprise's internal system through the Secure Sockets Layer (SSL) proxy technology. The VPN system assigns a virtual Internet Protocol (IP) address, and the internal system of the enterprise responds to the login operation of the target object based on the virtual IP address, generates the corresponding system log, and identifies the identity of the target object based on the vi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/40H04L61/5007
CPCH04L63/0876
Inventor 蒙斌袁文亮刘春秀韦明豪陈樱冯文宝陈晟
Owner CHINA TELECOM CORP LTD