CN106534046A - Mimicry data transmission server and data transmission method - Google Patents
Mimicry data transmission server and data transmission method Download PDFInfo
- Publication number
- CN106534046A CN106534046A CN201510574160.1A CN201510574160A CN106534046A CN 106534046 A CN106534046 A CN 106534046A CN 201510574160 A CN201510574160 A CN 201510574160A CN 106534046 A CN106534046 A CN 106534046A
- Authority
- CN
- China
- Prior art keywords
- protocol
- type
- mimicry
- client
- server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1441—Countermeasures against malicious traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
- H04L69/03—Protocol definition or specification
Abstract
The invention provides a mimicry data transmission server and a data transmission method. The server comprises a mimicry protocol characteristic management module, a mimicry protocol selection module and a mimicry protocol data transmission module; the mimicry protocol characteristic management module is used for managing multiple protocol characteristics in a protocol characteristic database form; the protocol characteristics include protocol types, operating system types, stage codes and response codes; the mimicry protocol selection module is used for disguising a virtual server including a specific operating system and protocol type based on a request of a client side, and sending related information of the specific operating system and protocol type adopted by the virtual server to the client side sending the request, wherein the specific operating system and protocol type come from a protocol characteristic database; and the mimicry protocol data transmission module is used for completing data transmission between the client side and a server side in a session for one time based on the virtual server constructed for the client side by the mimicry protocol selection module.
Description
Technical field
The present invention relates to networking technology area, is related specifically to Security Data Transmission, and in particular to a kind of mimicry data
Transmission server and data transmission method.
Background technology
Under internet environment, data transfer has reliable data transmission and corrupt data transmission.In ICP/IP protocol
Under stack, the typical protocol of reliable data transmission is transmission control protocol (TCP), and corrupt data transmission is number of users
According to datagram protocol (UDP), in addition for the problem run in TCP transmission stream data, there has been proposed stream control transmission
Agreement (SCTP).It is although IETF is for these protocol definitions RFC, different and real due to operating system
, even if same agreement under different operating system, also there is difference in the understanding difference of existing personnel.Client passes through
Connection request is sent to service end, according to the response that service end is beamed back, can determine whether which kind of service end uses operate
System, which system version and which kind of agreement.This just provides the necessary information of object of attack for network attack person.
By preventing attacker to be adopted system and other information, the present invention to use for reference biology from judging service end exactly
In mimicry thinking, make service end in different times, for different clients, make different responses, make visitor
Family end can not judge service end for information about exactly, so as to reach the purpose that interference client judges.
The content of the invention
It is an object of the invention to provide a kind of service end mimicry data transmission method, the method prevents client from accurate
Really judge service end for information about, prevent attacker from further implementing targetedly to attack.
To achieve the above object of the invention, a kind of mimicry data transfer server of the invention, the server are included:Intend
State protocol characteristic management module, mimicry protocol selection module and mimicry protocol data transmission module;
The mimicry protocol characteristic management module, for some agreements of the format management using protocol characteristic data base
Feature, the protocol characteristic are included:Protocol type, OS Type, stage code and answer code;The agreement
Property data base can be arranged independently of mimicry protocol characteristic management module or be located at mimicry protocol characteristic management module
On.
The mimicry protocol selection module, for client-based request camouflage, one includes specific operating system
With the virtual server of protocol type, and will virtual server adopt specific operation system it is related to protocol type
Information beams back the client for sending request;
Wherein, the specific operating system and protocol type come from protocol characteristic data base;
The mimicry protocol data transmission module, for based on mimicry protocol selection module be client build it is virtual
Server completes the data transfer in a session between client and service end.
Optionally, above-mentioned server is also included:Protocol characteristic acquisition module, for using ergonomic method,
It is or the method acquisition protocols feature that corresponding operating system or client are surveyed is installed, and the agreement for collecting is special
The condition code levied is stored in protocol characteristic data base;Wherein, the agreement spy for being collected using protocol characteristic acquisition module
Levy and protocol characteristic data base is input to by the mimicry protocol characteristic management module.
Optionally, above-mentioned server is also included:Parsing module, for the user's request obtained based on server, is sentenced
The protocol type of disconnected client.
Above-mentioned mimicry protocol selection module is further included:
OS Type acquisition module, for adopting the virtual opetrating system for obtaining one of with the following method server
Type:
Method one:The IP address of the client received according to server, port numbers, request time and stage code, meter
Calculation obtains OS Type;
Method two, determines OS Type using random method;
Method three, sends the time using the request command of client and determines OS Type;
Answer code acquisition submodule, for obtained according to parsing the protocol type of client, virtual opetrating system
The stage code that type, client send is key assignments, and search protocol property data base drawn answer code, responded with this
Code is responded to client request;
Record sub module, the virtual opetrating system type set for a client for adopting four-tuple list records,
The element that the quaternary Groups List is included is followed successively by:Client ip, port numbers, OS Type and protocol type.
Additionally, present invention also offers a kind of mimicry data transmission method, the data transmission method is using above-mentioned mimicry
Data transfer server is client transmissions data, and the data transmission method includes:
Step 101) client sends service request, sets up the connection of server and client side;
Step 102) serviced with client ip address, port numbers and protocol type that client sends as key assignments
The type of the virtual opetrating system at device end;
Wherein, the type of virtual opetrating system is included:The operating system and not serviced device reality of the actual employing of server
Border adopts and is stored in the operating system of protocol characteristic data base;
Step 103) with the stage code of the protocol type of client, the type of virtual opetrating system and client transmission be
Key assignments, search protocol property data base, and then meet with a response code or response routines, and based on the answer code for obtaining or
Response routines carry out the data transfer of a session between client and server;
Wherein, protocol characteristic data base is the condition code for storing the protocol characteristic for collecting, the agreement spy
Levy and include:Protocol type, OS Type, stage code and answer code.
Optionally, 102) above-mentioned steps further include:
Step 102-1) after service end obtains client request, judgement obtains protocol type;
Step 102-2) adopt the virtual opetrating system type obtained one of with the following method for a client:
Method one, according to the IP address of client, port numbers, request time and stage code, is calculated operation system
System type;
Method two, determines OS Type using random method;
Method three, determines OS Type according to request time.
Above-mentioned steps 103) with protocol type, virtual opetrating system type, stage code as key assignments, search protocol feature
Data base, draws answer code, client request is responded as clients providing data with this answer code.
Compared with prior art, the present invention has following advantages:The present invention solves attacker and accurately judges service end
The problem of used operating system, protocol version, reduces the probability being broken to a certain extent.
Description of the drawings
Fig. 1 mimicry data transmission applications schematic diagram of a scenario provided in an embodiment of the present invention;
The transmitting procedure schematic diagram of Fig. 2 mimicry data transmission systems provided in an embodiment of the present invention;
TCP mimicrys data transfer example in Fig. 3 embodiments provided in an embodiment of the present invention.
Specific embodiment
Technical scheme is described in detail with form below in conjunction with the accompanying drawings.
The present invention provides a kind of mimicry data transfer server and the data transmission method based on the server, the number
Client is prevented from judging server exactly for information about according to transmission method, and then prevents potential attacker couple
Server implementation is targetedly attacked.
To achieve the above object of the invention, a kind of mimicry data transfer server of the invention, including:Mimicry agreement is special
Levy management module, mimicry protocol selection module and mimicry protocol data transmission module.In the present invention, mimicry agreement
Feature management module is responsible for the management of protocol characteristic, the protocol characteristic include protocol type, OS Type,
Stage code, answer code etc..In the present invention, mimicry protocol selection module is responsible for selecting after being connected to client request
Specific protocol pattern carries out response process.Wherein mimicry protocol data transmission module is responsible for after agreement is selected,
In the agreement of the same version of an ession for telecommunication holding, the data transfer of server and client side is consistently completed.
The management method that above-mentioned mimicry protocol characteristic management module is adopted refers to the side adopted during the module management protocol characteristic
Method.The protocol characteristic includes protocol type, OS Type, stage code, answer code, with protocol characteristic storehouse
Form occur.The collection of protocol characteristic can adopt ergonomic method, or install corresponding operating system,
The method surveyed using client.After protocol characteristic is collected, it is input into by mimicry protocol characteristic management module
To protocol characteristic data base, the process of input can have man machine interface.
After the agreement system of selection that above-mentioned mimicry protocol selection module is adopted refers to that service end obtains client request, judge
Go out protocol type, by mimicry protocol selection module according to certain function (function can with but be not intended to limit using breathe out
Uncommon function), with the IP address of client, port numbers, request time, stage code as input, it is calculated virtual behaviour
Make system type;Random method wherein may also be employed or request time determines OS Type.With protocol type (this
The protocol type at place is to be determined using conventional analysis method when client request is reached), virtual opetrating system class
Type, stage code are key assignments, and search protocol feature database drawn answer code, client request is responded with this code,
And operating system is recorded in (client ip, port numbers, OS Type, protocol type) quaternary Groups List
Type.So as to specific operating system and protocol realization can be pretended.
Above-mentioned server is also included:Parsing module, for the user's request obtained based on server, judges client
Protocol type.
The data transmission method that above-mentioned mimicry protocol data transmission module is adopted refers to the service between service end and client
After connection establishment, OS Type, as key assignments, is found out with (client ip, port numbers, protocol type),
Again with (protocol type, OS Type, stage code) as key assignments, search protocol feature database, meet with a response code
Or response routines, respective data transfer is carried out afterwards.Response to particular clients particular port is maintained thus
Concordance.
Above-mentioned server is also included:Protocol characteristic acquisition module, for using ergonomic method, Huo Zhean
Pretend the method acquisition protocols feature for answering operating system or client actual measurement, and by the spy of the protocol characteristic for collecting
Levy code and be stored in protocol characteristic data base;Wherein, the protocol characteristic for being collected using protocol characteristic acquisition module is passed through
The mimicry protocol characteristic management module is input to protocol characteristic data base.
Additionally, present invention also offers a kind of data transmission method, plan of the data transmission method using above-mentioned record
State data transfer server is client transmissions data, and the data transmission method includes:Step 101) client
Go out service request, set up the connection of server and client side;Step 102) with the client ip ground of client transmission
Location, port numbers and protocol type are the type of the virtual opetrating system that key assignments obtains server end;Wherein, it is virtual to grasp
The type for making system is included:The operating system of the actual employing of server and not serviced device it is actual employing and be stored in association
The operating system of view property data base;Step 103) with the protocol type of client, the type of virtual opetrating system and
The stage code that client sends is key assignments, search protocol property data base, and then meet with a response code or response routines,
And the data transfer of a session between client and server is carried out based on the answer code or response routines that obtain;
Wherein, protocol characteristic data base is for storing the condition code of protocol characteristic for collecting, the protocol characteristic bag
Contain:Protocol type, OS Type, stage code and answer code.
102) above-mentioned steps further include:
Step 102-1) after service end obtains client request, judgement obtains protocol type;
Step 102-2) adopt the virtual opetrating system type obtained one of with the following method for a client:
Method one, according to function (herein function including but not limited to adopt hash function), with the IP ground of client
Location, port numbers, request time, stage code are input, are calculated OS Type;
Method two, determines OS Type using random method;
Method three, determines OS Type according to request time.
Above-mentioned steps 103) with protocol type, virtual opetrating system type, stage code as key assignments, search protocol feature
Data base, draws answer code, client request is responded as clients providing data with this answer code.
Below in conjunction with the accompanying drawings and specific embodiment, a kind of service end mimicry data transmission method provided by the present invention is made into
One step is illustrated.
Embodiment
Below in conjunction with the accompanying drawings 1, accompanying drawing 2, the explanation service end mimicry data transmission method of accompanying drawing 3.As shown in figure 1,
It is mimicry data transmission applications scene.In this scene, real service end can disguise oneself as different service ends, described
The service end of camouflage is using virtual opetrating system and the protocol type specified.As shown in figure 3, assuming that host-host protocol
Using mimicry data transfer example during TCP.With reference to this with reference to Fig. 2 explanation present invention.
It is assumed that we adopt ergonomics method, Windows XP, Windows NT, 2.6 and of Linux is obtained
The condition code that the corresponding TCP Reno of FreeBSD are realized, and it is stored in protocol characteristic storehouse.
It is assumed that client uses Windows XP, its IP address is 192.168.1.1 (port numbers 1054), is sent out
Play TCP SYN and be grouped into service end, 17 points 25 seconds when time now is 23 days 3 June in 2015.Service
After termination receives the TCP SYN packets, the protocol type being grouped using IP can determine whether it is TCP, then with
(192.168.1.1,17 points 25 seconds, SYN during 1054,2015 on June 23,3) is that mimicry agreement selects mould
The input of block, it is assumed that the action type for obtaining is Windows NT;Searched with (TCP, Windows NT, SYN)
Rope protocol characteristic storehouse, the code that meets with a response (it is assumed that 90), client decide that service end after the answer code is obtained
Operating system is Windows NT, using TCP Reno.Service end is in (client ip, port numbers, operation system
System type, protocol type) (192.168.1.1,1054, Windows NT, TCP Reno) is recorded in quaternary Groups List.
In the subsequent data transmission node of the client, service end then can consistently use Windows NT/TCP
Reno is processed to it.
In sum, Windows XP operating systems, Windows NT are collected using ergonomics method
The condition code that the corresponding TCP Reno of operating system, 2.6 operating systems of Linux and FreeBSD operating systems are realized,
And condition code is stored in into protocol characteristic data base by mimicry protocol characteristic management module.
Illustrate that the other guide in document is directed to the those of ordinary skill in this professional field, can carry out technology realization,
Here repeat no more.
It should be noted last that, above example is only to illustrate technical scheme and unrestricted.Although
The present invention is described in detail with reference to embodiment, it will be understood by those within the art that, to the present invention
Technical scheme modify or equivalent, without departure from the spirit and scope of technical solution of the present invention, which is equal
Should cover in the middle of scope of the presently claimed invention.
Claims (8)
1. a kind of mimicry data transfer server, it is characterised in that the server is included:Mimicry protocol characteristic pipe
Reason module, mimicry protocol selection module and mimicry protocol data transmission module;
The mimicry protocol characteristic management module, for some agreements of the format management using protocol characteristic data base
Feature, the protocol characteristic are included:Protocol type, OS Type, stage code and answer code;
The mimicry protocol selection module, for client-based request camouflage, one includes specific operating system
With the virtual server of protocol type, and will virtual server adopt specific operation system it is related to protocol type
Information beams back the client for sending request;
Wherein, the specific operating system and protocol type come from protocol characteristic data base;
The mimicry protocol data transmission module, for based on mimicry protocol selection module be client build it is virtual
Server completes the data transfer in a session between client and service end.
2. mimicry data transfer server according to claim 1, it is characterised in that the server is also wrapped
Contain:
Protocol characteristic acquisition module, for using ergonomic method, or installs corresponding operating system or visitor
The method acquisition protocols feature of family end actual measurement, and the condition code of the protocol characteristic for collecting is stored in into protocol characteristic number
According to storehouse;
Wherein, managed by the mimicry protocol characteristic using the protocol characteristic that protocol characteristic acquisition module is collected
Module is input to protocol characteristic data base.
3. mimicry data transfer server according to claim 1, it is characterised in that adopt ergonomics
Method collect Windows XP operating systems, Windows NT operating systems, 2.6 operating systems of Linux and
The condition code that the corresponding TCP Reno of FreeBSD operating systems are realized, and condition code is managed by mimicry protocol characteristic
Module is stored in protocol characteristic data base.
4. mimicry data transfer server according to claim 1, it is characterised in that the server is also wrapped
Contain:
Parsing module, for the user's request obtained based on server, judges the protocol type of client.
5. the mimicry data transfer server according to 4 claim, it is characterised in that the mimicry agreement choosing
Select module further to include:
OS Type acquisition module, for adopting the virtual opetrating system for obtaining one of with the following method server
Type:
Method one:The IP address of the client received according to server, port numbers, request time and stage code, meter
Calculation obtains OS Type;
Method two, determines OS Type using random method;
Method three, sends the time using the request command of client and determines OS Type;
Answer code acquisition submodule, for obtained according to parsing the protocol type of client, virtual opetrating system
The stage code that type, client send is key assignments, and search protocol property data base drawn answer code, responded with this
Code is responded to client request;
Record sub module, the virtual opetrating system type set for a client for adopting four-tuple list records,
The element that the quaternary Groups List is included is followed successively by:Client ip, port numbers, OS Type and protocol type.
6. a kind of mimicry data transmission method, the data transmission method is using any one right in claim 1-5
It is required that the mimicry data transfer server recorded is client transmissions data, the data transmission method includes:
Step 101) client sends service request, sets up the connection of server and client side;
Step 102) serviced with client ip address, port numbers and protocol type that client sends as key assignments
The type of the virtual opetrating system at device end;
Wherein, the type of virtual opetrating system is included:The operating system and not serviced device reality of the actual employing of server
Border adopts and is stored in the operating system of protocol characteristic data base;
Step 103) with the stage code of the protocol type of client, the type of virtual opetrating system and client transmission be
Key assignments, search protocol property data base, and then meet with a response code or response routines, and based on the answer code for obtaining or
Response routines carry out the data transfer of a session between client and server;
Wherein, protocol characteristic data base is the condition code for storing the protocol characteristic for collecting, the agreement spy
Levy and include:Protocol type, OS Type, stage code and answer code.
7. mimicry data transmission system according to claim 6, it is characterised in that the step 102) enter
One step is included:
Step 102-1) after service end obtains client request, judgement obtains protocol type;
Step 102-2) adopt the virtual opetrating system type obtained one of with the following method for a client:
Method one, according to the IP address of client, port numbers, request time and stage code, is calculated operation system
System type;
Method two, determines OS Type using random method;
Method three, determines OS Type according to request time.
8. mimicry data transmission system according to claim 7, it is characterised in that the step 103) with
Protocol type, virtual opetrating system type, stage code are key assignments, and search protocol property data base draws answer code,
Client request is responded as clients providing data with this answer code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510574160.1A CN106534046B (en) | 2015-09-10 | 2015-09-10 | A kind of mimicry data transfer server and data transmission method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510574160.1A CN106534046B (en) | 2015-09-10 | 2015-09-10 | A kind of mimicry data transfer server and data transmission method |
Publications (2)
Publication Number | Publication Date |
---|---|
CN106534046A true CN106534046A (en) | 2017-03-22 |
CN106534046B CN106534046B (en) | 2019-08-20 |
Family
ID=58346119
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510574160.1A Active CN106534046B (en) | 2015-09-10 | 2015-09-10 | A kind of mimicry data transfer server and data transmission method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN106534046B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110401601A (en) * | 2019-08-20 | 2019-11-01 | 之江实验室 | A kind of mimicry Routing Protocol system and method |
CN110557437A (en) * | 2019-08-05 | 2019-12-10 | 上海拟态数据技术有限公司 | universal mimicry distribution voting scheduling device and method based on user-defined protocol |
CN114338225A (en) * | 2021-03-29 | 2022-04-12 | 井芯微电子技术(天津)有限公司 | Strategy distributor, mimic switch and network system |
CN114338225B (en) * | 2021-03-29 | 2024-04-12 | 井芯微电子技术(天津)有限公司 | Policy distributor, mimicry switch and network system |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104394150A (en) * | 2014-11-26 | 2015-03-04 | 大连梯耐德网络技术有限公司 | System and method for implementing mimic security network architecture based on hardware reconfiguration |
US20150121529A1 (en) * | 2012-09-28 | 2015-04-30 | Juniper Networks, Inc. | Dynamic service handling using a honeypot |
CN104754048A (en) * | 2015-03-30 | 2015-07-01 | 中国人民解放军信息工程大学 | Imitative organization structure of server cluster |
CN104766025A (en) * | 2015-03-23 | 2015-07-08 | 中国人民解放军信息工程大学 | Mimicry tamper-proof method of distributed file system |
-
2015
- 2015-09-10 CN CN201510574160.1A patent/CN106534046B/en active Active
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20150121529A1 (en) * | 2012-09-28 | 2015-04-30 | Juniper Networks, Inc. | Dynamic service handling using a honeypot |
CN104394150A (en) * | 2014-11-26 | 2015-03-04 | 大连梯耐德网络技术有限公司 | System and method for implementing mimic security network architecture based on hardware reconfiguration |
CN104766025A (en) * | 2015-03-23 | 2015-07-08 | 中国人民解放军信息工程大学 | Mimicry tamper-proof method of distributed file system |
CN104754048A (en) * | 2015-03-30 | 2015-07-01 | 中国人民解放军信息工程大学 | Imitative organization structure of server cluster |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110557437A (en) * | 2019-08-05 | 2019-12-10 | 上海拟态数据技术有限公司 | universal mimicry distribution voting scheduling device and method based on user-defined protocol |
CN110557437B (en) * | 2019-08-05 | 2021-11-19 | 上海拟态数据技术有限公司 | Universal mimicry distribution voting scheduling device and method based on user-defined protocol |
CN110401601A (en) * | 2019-08-20 | 2019-11-01 | 之江实验室 | A kind of mimicry Routing Protocol system and method |
CN114338225A (en) * | 2021-03-29 | 2022-04-12 | 井芯微电子技术(天津)有限公司 | Strategy distributor, mimic switch and network system |
CN114338225B (en) * | 2021-03-29 | 2024-04-12 | 井芯微电子技术(天津)有限公司 | Policy distributor, mimicry switch and network system |
Also Published As
Publication number | Publication date |
---|---|
CN106534046B (en) | 2019-08-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103327025B (en) | Method for network access control and device | |
CN104169937B (en) | Chance system scans | |
CN103929429B (en) | Network Vulnerability Scanning System and method based on RESTful Web services | |
CN110311899A (en) | Multiservice system access method, device and server | |
CN108512885A (en) | Network packet to being identified as message queue telemetering transmission packet executes specific action | |
CN101138219B (en) | Communication method and system with client computer by network | |
CN102055813A (en) | Access controlling method for network application and device thereof | |
CN110213212A (en) | A kind of classification method and device of equipment | |
CA2716544A1 (en) | Method and system for providing network services | |
CN105681385B (en) | Information-pushing method and device | |
US10693706B2 (en) | Method and apparatus of performing simultaneous multi-agent access for command execution through a single client | |
CN111064780B (en) | Multitask content updating method, device, equipment and medium | |
CN108923974A (en) | A kind of Internet of Things assets fingerprint identification method and system | |
CN106506281B (en) | Vehicle toll communication test method, the network equipment and system | |
CN105099952B (en) | A kind of resource allocation methods and device | |
CN102598637B (en) | Communications system | |
CN106534046A (en) | Mimicry data transmission server and data transmission method | |
CN107104846A (en) | A kind of method for realizing resource distribution, device and resource distribution center | |
US7218714B2 (en) | Method of calling service among devices in home network | |
CN104023036A (en) | TCP (transmission control protocol) bypass blocking method and device | |
CN106131039A (en) | The processing method and processing device of SYN flood attack | |
KR101518470B1 (en) | Method for detecting a number of the devices of a plurality of client terminals selected by a web server from the internet request traffics sharing the public IP address and System for detecting selectively the same | |
CN106970843A (en) | remote invocation method and device | |
CN103036895B (en) | A kind of status tracking method and system | |
CN110381174A (en) | It is a kind of based on the high speed domain name analytic method statelessly scanned |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20210802 Address after: Room 1601, 16th floor, East Tower, Ximei building, No. 6, Changchun Road, high tech Industrial Development Zone, Zhengzhou, Henan 450001 Patentee after: Zhengzhou xinrand Network Technology Co.,Ltd. Address before: 100190, No. 21 West Fourth Ring Road, Beijing, Haidian District Patentee before: INSTITUTE OF ACOUSTICS, CHINESE ACADEMY OF SCIENCES |