Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

78 results about "DNS hijacking" patented technology

DNS hijacking, DNS poisoning, or DNS redirection is the practice of subverting the resolution of Domain Name System (DNS) queries. This can be achieved by malware that overrides a computer's TCP/IP configuration to point at a rogue DNS server under the control of an attacker, or through modifying the behaviour of a trusted DNS server so that it does not comply with internet standards.

Credible website identity installation and identification method

ActiveCN102611707ASolve the installationSolve security identification problems such as the inability to prevent dns hijackingUser identity/authority verificationData switching networksThird partyDNS hijacking
The invention discloses a credible website identity installation and identification method which comprises the following steps that: website management equipment sends the information of a website on which a credible identity needs to be installed and the basic information of an enterprise to a third party website authentication institution to authenticate the credibility; if the credibility authentication is passed, the website management equipment uploads a generated credible identity document with a signature to a root directory of the website or to a website server to configure; when the browser of client terminal equipment accesses a website, the client terminal equipment fist judges whether the website has the credible identification document or not; if yes, the composition of the credible identity document is judged and authorization is carried out; and if the authentication is passed, the credible authentication identity of the website is displayed through the client terminal equipment. The invention can solve the installation problem of the credible identities of existing websites and the safety identification problems that domain name system (dns) hijacking cannot be prevented and the like, and provides the method which is simpler, safer, easier to identify and has better compatibility.
Owner:北龙中网(北京)科技有限责任公司

Installation and identification method of website credible identity based on domain name system technology

ActiveCN102629923ASolve security identification problems such as inability to identify DNS hijackingEasy to identifyTransmissionThird partyDomain name
The invention discloses an installation and identification method of a website credible identity based on the domain name system technology. The installation is realized by the steps: website management equipment sends the website information and enterprise essential information requiring the credible identity installation to a third party website verifying mechanism to carry out credibility verification; if passing the credibility verification, the generated credible identity file with signature is sent to the website management equipment; the website management equipment converts the host name part of which the domain name is verified into a credible query domain name of which the domain name is verified by using a hashing algorithm code converting manner; and the credible identity file is compressed and grouped by the third party website verifying mechanism, and is converted into at least one text character string to be added to the record of the credible query domain name. According to the invention, the installation problem of the traditional website credible identity and safety identification problems that the DNS (domain name system) hijack and the like cannot be identified are solved; and the method is simpler, safer, easier to distinguish and better in compatibility.
Owner:北龙中网(北京)科技有限责任公司

Method and device for pushing control data

InactiveCN105657072AReduce lossesReduced instances of geographical information discrepanciesAdvertisementsTransmissionDomain nameDNS hijacking
An embodiment of the invention discloses a method and a device for pushing control data. The method and the device are applied to a control server. The method includes steps of applying for an auxiliary URL (uniform resource locator) for directional advertisements for target regions; receiving first requests for accessing the corresponding auxiliary URL for each advertisement request; extracting second source IP (internet protocol) addresses according to the first requests; establishing corresponding relations between first source IP addresses and the second source IP addresses; determining IP addresses of the directional advertisements for the target regions according to the multiple established corresponding relations; transmitting the determined IP addresses to media servers so as to stop the media servers from transmitting the directional advertisements for the target regions to advertisement front ends corresponding to the determined IP addresses. The first requests are transmitted by the advertisement front ends. The second source IP addresses correspond to the advertisement front ends. The directional advertisements at the determined IP addresses need to be stopped from being released. The method and the device have the advantages that regional information difference due to strategy routes on basis of domain names and DNS (domain name server) hijacking can be reduced, and accordingly loss of media can be decreased.
Owner:BEIJING QIYI CENTURY SCI & TECH CO LTD

Method for detecting previous connection of network based on DNS hijacking technology

The invention discloses a method for detecting a previous connection of a network based on a DNS hijacking technology. The method comprises the following steps that a gateway hardware is arranged on a bypass on a gateway; the gateway hardware carries out monitoring and mirroring on data on the gateway and analyzes the data after mirroring through the gateway hardware; once data flow including an HTTP protocol is discovered, the gateway hardware carries out hijacking; the gateway hardware forges a corresponding HTTP response packet for a HTTP protocol request and sends the HTTP response packet to a terminal device requesting an Internet connection; as long as the terminal device runs the HTTP response packet, the gateway hardware receives a DNS resolution request and responds, and returns an IP address on an appointed cheat server; when the terminal device initializes a request of the IP address, the cheat server can obtain and record Internet access data left by the terminal device; and the cheat server can judge whether the terminal device is connected previously or a previously connected time node of the terminal device through analysis of history access data. Through adoption of a passive monitoring way, the accuracy of detection can be extremely improved.
Owner:ZHEJIANG YUANWANG INFORMATION CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products