CN106534046A - Mimicry data transmission server and data transmission method - Google Patents

Mimicry data transmission server and data transmission method Download PDF

Info

Publication number
CN106534046A
CN106534046A CN201510574160.1A CN201510574160A CN106534046A CN 106534046 A CN106534046 A CN 106534046A CN 201510574160 A CN201510574160 A CN 201510574160A CN 106534046 A CN106534046 A CN 106534046A
Authority
CN
China
Prior art keywords
protocol
type
mimicry
client
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201510574160.1A
Other languages
Chinese (zh)
Other versions
CN106534046B (en
Inventor
王玲芳
王劲林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhengzhou Xinrand Network Technology Co ltd
Original Assignee
Institute of Acoustics CAS
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Institute of Acoustics CAS filed Critical Institute of Acoustics CAS
Priority to CN201510574160.1A priority Critical patent/CN106534046B/en
Publication of CN106534046A publication Critical patent/CN106534046A/en
Application granted granted Critical
Publication of CN106534046B publication Critical patent/CN106534046B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/03Protocol definition or specification 

Abstract

The invention provides a mimicry data transmission server and a data transmission method. The server comprises a mimicry protocol characteristic management module, a mimicry protocol selection module and a mimicry protocol data transmission module; the mimicry protocol characteristic management module is used for managing multiple protocol characteristics in a protocol characteristic database form; the protocol characteristics include protocol types, operating system types, stage codes and response codes; the mimicry protocol selection module is used for disguising a virtual server including a specific operating system and protocol type based on a request of a client side, and sending related information of the specific operating system and protocol type adopted by the virtual server to the client side sending the request, wherein the specific operating system and protocol type come from a protocol characteristic database; and the mimicry protocol data transmission module is used for completing data transmission between the client side and a server side in a session for one time based on the virtual server constructed for the client side by the mimicry protocol selection module.

Description

A kind of mimicry data transfer server and data transmission method
Technical field
The present invention relates to networking technology area, is related specifically to Security Data Transmission, and in particular to a kind of mimicry data Transmission server and data transmission method.
Background technology
Under internet environment, data transfer has reliable data transmission and corrupt data transmission.In ICP/IP protocol Under stack, the typical protocol of reliable data transmission is transmission control protocol (TCP), and corrupt data transmission is number of users According to datagram protocol (UDP), in addition for the problem run in TCP transmission stream data, there has been proposed stream control transmission Agreement (SCTP).It is although IETF is for these protocol definitions RFC, different and real due to operating system , even if same agreement under different operating system, also there is difference in the understanding difference of existing personnel.Client passes through Connection request is sent to service end, according to the response that service end is beamed back, can determine whether which kind of service end uses operate System, which system version and which kind of agreement.This just provides the necessary information of object of attack for network attack person.
By preventing attacker to be adopted system and other information, the present invention to use for reference biology from judging service end exactly In mimicry thinking, make service end in different times, for different clients, make different responses, make visitor Family end can not judge service end for information about exactly, so as to reach the purpose that interference client judges.
The content of the invention
It is an object of the invention to provide a kind of service end mimicry data transmission method, the method prevents client from accurate Really judge service end for information about, prevent attacker from further implementing targetedly to attack.
To achieve the above object of the invention, a kind of mimicry data transfer server of the invention, the server are included:Intend State protocol characteristic management module, mimicry protocol selection module and mimicry protocol data transmission module;
The mimicry protocol characteristic management module, for some agreements of the format management using protocol characteristic data base Feature, the protocol characteristic are included:Protocol type, OS Type, stage code and answer code;The agreement Property data base can be arranged independently of mimicry protocol characteristic management module or be located at mimicry protocol characteristic management module On.
The mimicry protocol selection module, for client-based request camouflage, one includes specific operating system With the virtual server of protocol type, and will virtual server adopt specific operation system it is related to protocol type Information beams back the client for sending request;
Wherein, the specific operating system and protocol type come from protocol characteristic data base;
The mimicry protocol data transmission module, for based on mimicry protocol selection module be client build it is virtual Server completes the data transfer in a session between client and service end.
Optionally, above-mentioned server is also included:Protocol characteristic acquisition module, for using ergonomic method, It is or the method acquisition protocols feature that corresponding operating system or client are surveyed is installed, and the agreement for collecting is special The condition code levied is stored in protocol characteristic data base;Wherein, the agreement spy for being collected using protocol characteristic acquisition module Levy and protocol characteristic data base is input to by the mimicry protocol characteristic management module.
Optionally, above-mentioned server is also included:Parsing module, for the user's request obtained based on server, is sentenced The protocol type of disconnected client.
Above-mentioned mimicry protocol selection module is further included:
OS Type acquisition module, for adopting the virtual opetrating system for obtaining one of with the following method server Type:
Method one:The IP address of the client received according to server, port numbers, request time and stage code, meter Calculation obtains OS Type;
Method two, determines OS Type using random method;
Method three, sends the time using the request command of client and determines OS Type;
Answer code acquisition submodule, for obtained according to parsing the protocol type of client, virtual opetrating system The stage code that type, client send is key assignments, and search protocol property data base drawn answer code, responded with this Code is responded to client request;
Record sub module, the virtual opetrating system type set for a client for adopting four-tuple list records, The element that the quaternary Groups List is included is followed successively by:Client ip, port numbers, OS Type and protocol type.
Additionally, present invention also offers a kind of mimicry data transmission method, the data transmission method is using above-mentioned mimicry Data transfer server is client transmissions data, and the data transmission method includes:
Step 101) client sends service request, sets up the connection of server and client side;
Step 102) serviced with client ip address, port numbers and protocol type that client sends as key assignments The type of the virtual opetrating system at device end;
Wherein, the type of virtual opetrating system is included:The operating system and not serviced device reality of the actual employing of server Border adopts and is stored in the operating system of protocol characteristic data base;
Step 103) with the stage code of the protocol type of client, the type of virtual opetrating system and client transmission be Key assignments, search protocol property data base, and then meet with a response code or response routines, and based on the answer code for obtaining or Response routines carry out the data transfer of a session between client and server;
Wherein, protocol characteristic data base is the condition code for storing the protocol characteristic for collecting, the agreement spy Levy and include:Protocol type, OS Type, stage code and answer code.
Optionally, 102) above-mentioned steps further include:
Step 102-1) after service end obtains client request, judgement obtains protocol type;
Step 102-2) adopt the virtual opetrating system type obtained one of with the following method for a client:
Method one, according to the IP address of client, port numbers, request time and stage code, is calculated operation system System type;
Method two, determines OS Type using random method;
Method three, determines OS Type according to request time.
Above-mentioned steps 103) with protocol type, virtual opetrating system type, stage code as key assignments, search protocol feature Data base, draws answer code, client request is responded as clients providing data with this answer code.
Compared with prior art, the present invention has following advantages:The present invention solves attacker and accurately judges service end The problem of used operating system, protocol version, reduces the probability being broken to a certain extent.
Description of the drawings
Fig. 1 mimicry data transmission applications schematic diagram of a scenario provided in an embodiment of the present invention;
The transmitting procedure schematic diagram of Fig. 2 mimicry data transmission systems provided in an embodiment of the present invention;
TCP mimicrys data transfer example in Fig. 3 embodiments provided in an embodiment of the present invention.
Specific embodiment
Technical scheme is described in detail with form below in conjunction with the accompanying drawings.
The present invention provides a kind of mimicry data transfer server and the data transmission method based on the server, the number Client is prevented from judging server exactly for information about according to transmission method, and then prevents potential attacker couple Server implementation is targetedly attacked.
To achieve the above object of the invention, a kind of mimicry data transfer server of the invention, including:Mimicry agreement is special Levy management module, mimicry protocol selection module and mimicry protocol data transmission module.In the present invention, mimicry agreement Feature management module is responsible for the management of protocol characteristic, the protocol characteristic include protocol type, OS Type, Stage code, answer code etc..In the present invention, mimicry protocol selection module is responsible for selecting after being connected to client request Specific protocol pattern carries out response process.Wherein mimicry protocol data transmission module is responsible for after agreement is selected, In the agreement of the same version of an ession for telecommunication holding, the data transfer of server and client side is consistently completed.
The management method that above-mentioned mimicry protocol characteristic management module is adopted refers to the side adopted during the module management protocol characteristic Method.The protocol characteristic includes protocol type, OS Type, stage code, answer code, with protocol characteristic storehouse Form occur.The collection of protocol characteristic can adopt ergonomic method, or install corresponding operating system, The method surveyed using client.After protocol characteristic is collected, it is input into by mimicry protocol characteristic management module To protocol characteristic data base, the process of input can have man machine interface.
After the agreement system of selection that above-mentioned mimicry protocol selection module is adopted refers to that service end obtains client request, judge Go out protocol type, by mimicry protocol selection module according to certain function (function can with but be not intended to limit using breathe out Uncommon function), with the IP address of client, port numbers, request time, stage code as input, it is calculated virtual behaviour Make system type;Random method wherein may also be employed or request time determines OS Type.With protocol type (this The protocol type at place is to be determined using conventional analysis method when client request is reached), virtual opetrating system class Type, stage code are key assignments, and search protocol feature database drawn answer code, client request is responded with this code, And operating system is recorded in (client ip, port numbers, OS Type, protocol type) quaternary Groups List Type.So as to specific operating system and protocol realization can be pretended.
Above-mentioned server is also included:Parsing module, for the user's request obtained based on server, judges client Protocol type.
The data transmission method that above-mentioned mimicry protocol data transmission module is adopted refers to the service between service end and client After connection establishment, OS Type, as key assignments, is found out with (client ip, port numbers, protocol type), Again with (protocol type, OS Type, stage code) as key assignments, search protocol feature database, meet with a response code Or response routines, respective data transfer is carried out afterwards.Response to particular clients particular port is maintained thus Concordance.
Above-mentioned server is also included:Protocol characteristic acquisition module, for using ergonomic method, Huo Zhean Pretend the method acquisition protocols feature for answering operating system or client actual measurement, and by the spy of the protocol characteristic for collecting Levy code and be stored in protocol characteristic data base;Wherein, the protocol characteristic for being collected using protocol characteristic acquisition module is passed through The mimicry protocol characteristic management module is input to protocol characteristic data base.
Additionally, present invention also offers a kind of data transmission method, plan of the data transmission method using above-mentioned record State data transfer server is client transmissions data, and the data transmission method includes:Step 101) client Go out service request, set up the connection of server and client side;Step 102) with the client ip ground of client transmission Location, port numbers and protocol type are the type of the virtual opetrating system that key assignments obtains server end;Wherein, it is virtual to grasp The type for making system is included:The operating system of the actual employing of server and not serviced device it is actual employing and be stored in association The operating system of view property data base;Step 103) with the protocol type of client, the type of virtual opetrating system and The stage code that client sends is key assignments, search protocol property data base, and then meet with a response code or response routines, And the data transfer of a session between client and server is carried out based on the answer code or response routines that obtain; Wherein, protocol characteristic data base is for storing the condition code of protocol characteristic for collecting, the protocol characteristic bag Contain:Protocol type, OS Type, stage code and answer code.
102) above-mentioned steps further include:
Step 102-1) after service end obtains client request, judgement obtains protocol type;
Step 102-2) adopt the virtual opetrating system type obtained one of with the following method for a client:
Method one, according to function (herein function including but not limited to adopt hash function), with the IP ground of client Location, port numbers, request time, stage code are input, are calculated OS Type;
Method two, determines OS Type using random method;
Method three, determines OS Type according to request time.
Above-mentioned steps 103) with protocol type, virtual opetrating system type, stage code as key assignments, search protocol feature Data base, draws answer code, client request is responded as clients providing data with this answer code.
Below in conjunction with the accompanying drawings and specific embodiment, a kind of service end mimicry data transmission method provided by the present invention is made into One step is illustrated.
Embodiment
Below in conjunction with the accompanying drawings 1, accompanying drawing 2, the explanation service end mimicry data transmission method of accompanying drawing 3.As shown in figure 1, It is mimicry data transmission applications scene.In this scene, real service end can disguise oneself as different service ends, described The service end of camouflage is using virtual opetrating system and the protocol type specified.As shown in figure 3, assuming that host-host protocol Using mimicry data transfer example during TCP.With reference to this with reference to Fig. 2 explanation present invention.
It is assumed that we adopt ergonomics method, Windows XP, Windows NT, 2.6 and of Linux is obtained The condition code that the corresponding TCP Reno of FreeBSD are realized, and it is stored in protocol characteristic storehouse.
It is assumed that client uses Windows XP, its IP address is 192.168.1.1 (port numbers 1054), is sent out Play TCP SYN and be grouped into service end, 17 points 25 seconds when time now is 23 days 3 June in 2015.Service After termination receives the TCP SYN packets, the protocol type being grouped using IP can determine whether it is TCP, then with (192.168.1.1,17 points 25 seconds, SYN during 1054,2015 on June 23,3) is that mimicry agreement selects mould The input of block, it is assumed that the action type for obtaining is Windows NT;Searched with (TCP, Windows NT, SYN) Rope protocol characteristic storehouse, the code that meets with a response (it is assumed that 90), client decide that service end after the answer code is obtained Operating system is Windows NT, using TCP Reno.Service end is in (client ip, port numbers, operation system System type, protocol type) (192.168.1.1,1054, Windows NT, TCP Reno) is recorded in quaternary Groups List.
In the subsequent data transmission node of the client, service end then can consistently use Windows NT/TCP Reno is processed to it.
In sum, Windows XP operating systems, Windows NT are collected using ergonomics method The condition code that the corresponding TCP Reno of operating system, 2.6 operating systems of Linux and FreeBSD operating systems are realized, And condition code is stored in into protocol characteristic data base by mimicry protocol characteristic management module.
Illustrate that the other guide in document is directed to the those of ordinary skill in this professional field, can carry out technology realization, Here repeat no more.
It should be noted last that, above example is only to illustrate technical scheme and unrestricted.Although The present invention is described in detail with reference to embodiment, it will be understood by those within the art that, to the present invention Technical scheme modify or equivalent, without departure from the spirit and scope of technical solution of the present invention, which is equal Should cover in the middle of scope of the presently claimed invention.

Claims (8)

1. a kind of mimicry data transfer server, it is characterised in that the server is included:Mimicry protocol characteristic pipe Reason module, mimicry protocol selection module and mimicry protocol data transmission module;
The mimicry protocol characteristic management module, for some agreements of the format management using protocol characteristic data base Feature, the protocol characteristic are included:Protocol type, OS Type, stage code and answer code;
The mimicry protocol selection module, for client-based request camouflage, one includes specific operating system With the virtual server of protocol type, and will virtual server adopt specific operation system it is related to protocol type Information beams back the client for sending request;
Wherein, the specific operating system and protocol type come from protocol characteristic data base;
The mimicry protocol data transmission module, for based on mimicry protocol selection module be client build it is virtual Server completes the data transfer in a session between client and service end.
2. mimicry data transfer server according to claim 1, it is characterised in that the server is also wrapped Contain:
Protocol characteristic acquisition module, for using ergonomic method, or installs corresponding operating system or visitor The method acquisition protocols feature of family end actual measurement, and the condition code of the protocol characteristic for collecting is stored in into protocol characteristic number According to storehouse;
Wherein, managed by the mimicry protocol characteristic using the protocol characteristic that protocol characteristic acquisition module is collected Module is input to protocol characteristic data base.
3. mimicry data transfer server according to claim 1, it is characterised in that adopt ergonomics Method collect Windows XP operating systems, Windows NT operating systems, 2.6 operating systems of Linux and The condition code that the corresponding TCP Reno of FreeBSD operating systems are realized, and condition code is managed by mimicry protocol characteristic Module is stored in protocol characteristic data base.
4. mimicry data transfer server according to claim 1, it is characterised in that the server is also wrapped Contain:
Parsing module, for the user's request obtained based on server, judges the protocol type of client.
5. the mimicry data transfer server according to 4 claim, it is characterised in that the mimicry agreement choosing Select module further to include:
OS Type acquisition module, for adopting the virtual opetrating system for obtaining one of with the following method server Type:
Method one:The IP address of the client received according to server, port numbers, request time and stage code, meter Calculation obtains OS Type;
Method two, determines OS Type using random method;
Method three, sends the time using the request command of client and determines OS Type;
Answer code acquisition submodule, for obtained according to parsing the protocol type of client, virtual opetrating system The stage code that type, client send is key assignments, and search protocol property data base drawn answer code, responded with this Code is responded to client request;
Record sub module, the virtual opetrating system type set for a client for adopting four-tuple list records, The element that the quaternary Groups List is included is followed successively by:Client ip, port numbers, OS Type and protocol type.
6. a kind of mimicry data transmission method, the data transmission method is using any one right in claim 1-5 It is required that the mimicry data transfer server recorded is client transmissions data, the data transmission method includes:
Step 101) client sends service request, sets up the connection of server and client side;
Step 102) serviced with client ip address, port numbers and protocol type that client sends as key assignments The type of the virtual opetrating system at device end;
Wherein, the type of virtual opetrating system is included:The operating system and not serviced device reality of the actual employing of server Border adopts and is stored in the operating system of protocol characteristic data base;
Step 103) with the stage code of the protocol type of client, the type of virtual opetrating system and client transmission be Key assignments, search protocol property data base, and then meet with a response code or response routines, and based on the answer code for obtaining or Response routines carry out the data transfer of a session between client and server;
Wherein, protocol characteristic data base is the condition code for storing the protocol characteristic for collecting, the agreement spy Levy and include:Protocol type, OS Type, stage code and answer code.
7. mimicry data transmission system according to claim 6, it is characterised in that the step 102) enter One step is included:
Step 102-1) after service end obtains client request, judgement obtains protocol type;
Step 102-2) adopt the virtual opetrating system type obtained one of with the following method for a client:
Method one, according to the IP address of client, port numbers, request time and stage code, is calculated operation system System type;
Method two, determines OS Type using random method;
Method three, determines OS Type according to request time.
8. mimicry data transmission system according to claim 7, it is characterised in that the step 103) with Protocol type, virtual opetrating system type, stage code are key assignments, and search protocol property data base draws answer code, Client request is responded as clients providing data with this answer code.
CN201510574160.1A 2015-09-10 2015-09-10 A kind of mimicry data transfer server and data transmission method Active CN106534046B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510574160.1A CN106534046B (en) 2015-09-10 2015-09-10 A kind of mimicry data transfer server and data transmission method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510574160.1A CN106534046B (en) 2015-09-10 2015-09-10 A kind of mimicry data transfer server and data transmission method

Publications (2)

Publication Number Publication Date
CN106534046A true CN106534046A (en) 2017-03-22
CN106534046B CN106534046B (en) 2019-08-20

Family

ID=58346119

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510574160.1A Active CN106534046B (en) 2015-09-10 2015-09-10 A kind of mimicry data transfer server and data transmission method

Country Status (1)

Country Link
CN (1) CN106534046B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110401601A (en) * 2019-08-20 2019-11-01 之江实验室 A kind of mimicry Routing Protocol system and method
CN110557437A (en) * 2019-08-05 2019-12-10 上海拟态数据技术有限公司 universal mimicry distribution voting scheduling device and method based on user-defined protocol
CN114338225A (en) * 2021-03-29 2022-04-12 井芯微电子技术(天津)有限公司 Strategy distributor, mimic switch and network system
CN114338225B (en) * 2021-03-29 2024-04-12 井芯微电子技术(天津)有限公司 Policy distributor, mimicry switch and network system

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104394150A (en) * 2014-11-26 2015-03-04 大连梯耐德网络技术有限公司 System and method for implementing mimic security network architecture based on hardware reconfiguration
US20150121529A1 (en) * 2012-09-28 2015-04-30 Juniper Networks, Inc. Dynamic service handling using a honeypot
CN104754048A (en) * 2015-03-30 2015-07-01 中国人民解放军信息工程大学 Imitative organization structure of server cluster
CN104766025A (en) * 2015-03-23 2015-07-08 中国人民解放军信息工程大学 Mimicry tamper-proof method of distributed file system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150121529A1 (en) * 2012-09-28 2015-04-30 Juniper Networks, Inc. Dynamic service handling using a honeypot
CN104394150A (en) * 2014-11-26 2015-03-04 大连梯耐德网络技术有限公司 System and method for implementing mimic security network architecture based on hardware reconfiguration
CN104766025A (en) * 2015-03-23 2015-07-08 中国人民解放军信息工程大学 Mimicry tamper-proof method of distributed file system
CN104754048A (en) * 2015-03-30 2015-07-01 中国人民解放军信息工程大学 Imitative organization structure of server cluster

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110557437A (en) * 2019-08-05 2019-12-10 上海拟态数据技术有限公司 universal mimicry distribution voting scheduling device and method based on user-defined protocol
CN110557437B (en) * 2019-08-05 2021-11-19 上海拟态数据技术有限公司 Universal mimicry distribution voting scheduling device and method based on user-defined protocol
CN110401601A (en) * 2019-08-20 2019-11-01 之江实验室 A kind of mimicry Routing Protocol system and method
CN114338225A (en) * 2021-03-29 2022-04-12 井芯微电子技术(天津)有限公司 Strategy distributor, mimic switch and network system
CN114338225B (en) * 2021-03-29 2024-04-12 井芯微电子技术(天津)有限公司 Policy distributor, mimicry switch and network system

Also Published As

Publication number Publication date
CN106534046B (en) 2019-08-20

Similar Documents

Publication Publication Date Title
CN103327025B (en) Method for network access control and device
CN104169937B (en) Chance system scans
CN103929429B (en) Network Vulnerability Scanning System and method based on RESTful Web services
CN110311899A (en) Multiservice system access method, device and server
CN108512885A (en) Network packet to being identified as message queue telemetering transmission packet executes specific action
CN101138219B (en) Communication method and system with client computer by network
CN102055813A (en) Access controlling method for network application and device thereof
CN110213212A (en) A kind of classification method and device of equipment
CA2716544A1 (en) Method and system for providing network services
CN105681385B (en) Information-pushing method and device
US10693706B2 (en) Method and apparatus of performing simultaneous multi-agent access for command execution through a single client
CN111064780B (en) Multitask content updating method, device, equipment and medium
CN108923974A (en) A kind of Internet of Things assets fingerprint identification method and system
CN106506281B (en) Vehicle toll communication test method, the network equipment and system
CN105099952B (en) A kind of resource allocation methods and device
CN102598637B (en) Communications system
CN106534046A (en) Mimicry data transmission server and data transmission method
CN107104846A (en) A kind of method for realizing resource distribution, device and resource distribution center
US7218714B2 (en) Method of calling service among devices in home network
CN104023036A (en) TCP (transmission control protocol) bypass blocking method and device
CN106131039A (en) The processing method and processing device of SYN flood attack
KR101518470B1 (en) Method for detecting a number of the devices of a plurality of client terminals selected by a web server from the internet request traffics sharing the public IP address and System for detecting selectively the same
CN106970843A (en) remote invocation method and device
CN103036895B (en) A kind of status tracking method and system
CN110381174A (en) It is a kind of based on the high speed domain name analytic method statelessly scanned

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20210802

Address after: Room 1601, 16th floor, East Tower, Ximei building, No. 6, Changchun Road, high tech Industrial Development Zone, Zhengzhou, Henan 450001

Patentee after: Zhengzhou xinrand Network Technology Co.,Ltd.

Address before: 100190, No. 21 West Fourth Ring Road, Beijing, Haidian District

Patentee before: INSTITUTE OF ACOUSTICS, CHINESE ACADEMY OF SCIENCES