CN109451094B - Method, system, electronic device and medium for acquiring IP address of source station - Google Patents

Method, system, electronic device and medium for acquiring IP address of source station Download PDF

Info

Publication number
CN109451094B
CN109451094B CN201811596169.2A CN201811596169A CN109451094B CN 109451094 B CN109451094 B CN 109451094B CN 201811596169 A CN201811596169 A CN 201811596169A CN 109451094 B CN109451094 B CN 109451094B
Authority
CN
China
Prior art keywords
address
https
domain name
acquiring
addresses
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811596169.2A
Other languages
Chinese (zh)
Other versions
CN109451094A (en
Inventor
曾海波
叶盛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Qianxin Technology Group Co Ltd
Original Assignee
Qianxin Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Qianxin Technology Group Co Ltd filed Critical Qianxin Technology Group Co Ltd
Publication of CN109451094A publication Critical patent/CN109451094A/en
Application granted granted Critical
Publication of CN109451094B publication Critical patent/CN109451094B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic

Abstract

The application provides a method, a system, an electronic device and a medium for acquiring an IP address of a source station. The method comprises the following steps: acquiring an IP address set, judging whether IP addresses in the IP address set are alive or not, if so, storing the alive IP addresses as a first IP address set, and requesting to access the IP addresses in the first IP address set through an HTTPS; and obtaining return information of the HTTPS request access, judging whether the return information contains a domain name, if so, establishing a relation between the domain name and an IP address in a first IP address set, and taking the IP address with the established relation as a source station IP address of the domain name.

Description

Method, system, electronic device and medium for acquiring IP address of source station
Technical Field
The application relates to a method, a system, an electronic device and a medium for acquiring an IP address of a source station.
Background
A Content Delivery Network (CDN) has a basic idea of avoiding bottlenecks and links on the internet that may affect data transmission speed and stability as much as possible, so that Content transmission is faster and more stable. By placing node servers at various positions of the network to form a layer of intelligent virtual network on the basis of the existing internet, the CDN system can redirect the request of a user to a service node closest to the user in real time according to network flow, connection of each node, load condition, distance to the user, response time and other comprehensive information. The core purpose is to enable the user to access the network nearby to obtain the required content, solve the network congestion condition and obviously improve the response speed of the user to access the website or the downloading speed of the user.
The CDN stores the content of the Web site on CDN nodes which are distributed all over the country or even all over the world, and the user can obtain the content cached on the CDN nearby by accessing the Web site, so that the access speed is improved. After the CDN is started, user access in different regions can be different servers, a real server (source server) of the Web site generally only needs CDN nodes to access and obtain, and CDN node servers accessed by users in all regions of the country do not directly access the source server, so that broadband resources of the Web site server can be introduced, and the server pressure is reduced.
Currently, a number of websites use a CDN technology, but after the CDN technology is used, external access can only pass through the CDN, and a source station cannot be directly found. In some scenarios of malicious web pages or trojan control servers, the source station needs to be found to analyze or track the problem. Therefore, how to acquire the source IP address of the website in the network security field has become a significant issue.
Disclosure of Invention
One aspect of the present application provides a method for acquiring an IP address of a source station, where the method includes: acquiring an IP address set, judging whether IP addresses in the IP address set are alive or not, if so, storing the alive IP addresses as a first IP address set, and requesting to access the IP addresses in the first IP address set through an HTTPS; and obtaining return information of the HTTPS request access, judging whether the return information contains a domain name, if so, establishing a relation between the domain name and an IP address in a first IP address set, and taking the IP address with the established relation as a source station IP address of the domain name.
Optionally, the obtaining the IP address set includes: and acquiring the IP address under the preset condition, wherein the preset condition comprises a preset area and a preset IP protocol version.
Optionally, the determining whether the IP address in the IP address set is alive includes: and judging whether the IP addresses in the IP address set are alive or not through a detection tool nmap.
Optionally, before the determining whether the IP address in the IP address set is alive, the method further includes: acquiring an IP address of a CDN node; judging whether the IP address set contains the CDN node IP address or not, and if so, deleting the IP address which is the same as the CDN node IP address in the IP address set.
Optionally, the obtaining the CDN node IP address includes: the CDN node IP address is obtained through an IPIP database or a GeoV2 database.
Optionally, the obtaining the return information of the HTTPS request access and determining whether the return information includes a domain name includes: acquiring an HTTPS certificate in return information of the HTTPS request access; judging whether the domain name to which the HTTPS certificate belongs is returned in the HTTPS certificate; and if so, acquiring the domain name to which the HTTPS certificate belongs.
Optionally, the obtaining of the domain name to which the HTTPS certificate belongs includes: judging whether the domain names to which the HTTPS certificates belong are more than two, if so, marking the domain names to which the HTTPS certificates belong as multiple domain names, wherein the multiple domain names point to the same IP address.
Another aspect of the present application provides a system for acquiring an IP address of a source station, where the system includes: the access IP address module is used for acquiring an IP address set, judging whether IP addresses in the IP address set are alive or not, if so, storing the alive IP addresses as a first IP address set, and requesting to access the IP addresses in the first IP address set through HTTPS; and the source station IP address obtaining module is used for obtaining return information of the HTTPS request access, judging whether the return information contains a domain name, if so, establishing the relation between the domain name and the IP address in the first IP address set, and taking the IP address with the established relation as the source station IP address of the domain name.
Yet another aspect of the present application provides an electronic device, the device comprising: a processor; a memory storing a computer executable program which, when executed by the processor, causes the processor to perform the method of obtaining a source station IP address as described above.
Yet another aspect of the present application provides a computer-readable storage medium having stored thereon a computer program, wherein the program, when executed by a processor, implements the method of obtaining an IP address of a source station as described above.
Drawings
For a more complete understanding of the present application and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically shows a flowchart of a method for acquiring an IP address of a source station according to an embodiment of the present application;
fig. 2 schematically shows a flowchart of steps before the determining whether the IP addresses in the IP address set are alive in the method for acquiring an IP address of a source station according to the embodiment of the present application;
fig. 3 schematically shows a flowchart of steps of acquiring return information of HTTPS request access and determining whether the return information includes a domain name in the method for acquiring an IP address of a source station according to the embodiment of the present application;
fig. 4 schematically illustrates a block diagram of a source station IP address system provided by an embodiment of the present application;
fig. 5 schematically shows a block diagram of an electronic device provided according to an embodiment of the present application.
Detailed Description
Hereinafter, embodiments of the present application will be described with reference to the accompanying drawings. It is to be understood that such description is merely illustrative and not intended to limit the scope of the present application. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the application. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present application.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
One embodiment of the present application provides a method for acquiring an IP address of a source station, and referring to fig. 1, the method includes the contents of steps S101 to St 02:
step S101, an IP address set is obtained, whether the IP addresses in the IP address set are alive or not is judged, if yes, the alive IP addresses are stored as a first IP address set, and the IP addresses in the first IP address set are accessed through an HTTPS request.
Wherein, the acquiring the IP address set includes: and acquiring the IP address under the preset condition, wherein the preset condition comprises a preset area and a preset IP protocol version. The predetermined area may illustratively be worldwide, china wide, and so on. Common IP addresses in the preset IP protocol version are classified into two categories, i.e., IPv4 and IPv6, by the IP protocol version. The IPV4 has 4 segments of numbers, each segment not exceeding 255 at the maximum. IPv6 employs a 128-bit address length. In addition, the preset conditions can also comprise preset IP address categories and the like, the IP address addressing scheme divides the IP address space into A, B, C, D, E five classes, wherein A, B, C is a basic class, and D, E is used as multicast and reserved. The preset condition is not specifically limited in the embodiment of the present application, and may be one of the above multiple preset conditions, or a combination of multiple preset conditions, so that the actual limitation may be performed according to actual situations.
In addition, the determining whether the IP address in the IP address set is alive includes: and judging whether the IP addresses in the IP address set are alive or not through a detection tool nmap. The detection tool is used for filtering the IP addresses, and the IP addresses which do not survive are filtered, so that the complexity of subsequent judgment is reduced. The detection tool nmap is the Network Mapper. The method has three basic functions, namely detecting whether a group of hosts are online or not; secondly, scanning a host port and sniffing the provided network service; the operating system used by the host can also be inferred, the operating system can perform ping scanning when detecting whether the IP address is alive, the host responding to the scanning can be printed, and the like, and the detection tool nmap is used in the prior art and is not described in detail herein. In addition, the embodiment of the application also does not limit the tool for detecting whether the IP address is alive, and only needs to judge the survival of the IP address.
In a possible manner, before the determining whether the IP addresses in the IP address set are alive, referring to fig. 2, the step S101 further includes the following steps:
step S101a, obtain a CDN node IP address.
Wherein, the obtaining process is to obtain the IP address of the CDN node through the IPIP database or the GeoV2 database. Net, for example, by entering IP, obtains the IP address of the registered CDN node. The obtaining process is the prior art, and detailed description is not repeated herein in this application embodiment.
Step S101b, determining whether the IP address set includes the CDN node IP address, and if so, deleting an IP address in the IP address set that is the same as the CDN node IP address.
And by filtering the IP addresses containing the CDN nodes, the complexity of the subsequent steps is reduced. Thus, the elements in the first set of IP addresses obtained by step S101 are alive and do not contain known CDN node IP addresses.
Step S102, obtaining return information of the HTTPS request access, judging whether the return information contains a domain name, if so, establishing a relation between the domain name and an IP address in a first IP address set, and taking the IP address with the established relation as a source station IP address of the domain name.
In a feasible manner, the step of acquiring the return information of the HTTPS request access and determining whether the return information includes a domain name may be implemented by the following steps S201 to S203, referring to fig. 3:
step S201, acquiring an HTTPS certificate in the return information of the HTTPS request access.
When the HTTPS requests access to the connected IP address, an HTTPS certificate may be acquired from the access request return message. The HTTPS certificate is an HTTP SSL certificate, complies with an SSL protocol, is issued by a trusted digital certificate authority CA after the identity of the server is verified, and has the functions of server identity verification and data transmission encryption. Where the HTTP SSL certificate binds to the domain name and not the IP address.
Step S202, judging whether the domain name to which the HTTPS certificate belongs is returned in the HTTPS certificate.
Since the HTTP SSL certificate is bound to a domain name rather than an IP address, it is determined whether the domain name to which the HTTPs certificate belongs is returned in the HTTPs certificate, and if so, it is determined that the access to the IP address to which the HTTPs request to access the connection is successful, and the domain name to which the HTTPs certificate belongs is returned.
Step S203, if yes, acquiring a domain name to which the HTTPS certificate belongs.
At this time, the IP address of the HTTPS request access connection is associated with the domain name to which the HTTPS certificate belongs, that is, the source station IP address of the domain name is found.
It should be noted that, the obtaining of the domain name to which the HTTPS certificate belongs includes: judging whether the domain names to which the HTTPS certificates belong are more than two, if so, marking the domain names to which the HTTPS certificates belong as multiple domain names, wherein the multiple domain names point to the same IP address, and the multiple domain names refer to a plurality of domain names. According to actual requirements, after the domain name to which the HTTPS certificate belongs is marked as a multiple domain name, a decision may be made to discard the multiple domain names or record all the multiple domain names. If a record is made, multiple domain names should be marked for the IP, and typically these multiple domain names will point to the same IP.
In summary, in the embodiment of the present application, the IP address field is accessed through the HTTPS, the return information is obtained, and the HTTPS certificate in the return information includes the domain name to which the HTTPS certificate belongs, so that the relationship between the IP and the domain name is established. The method and the device realize the acquisition of the IP address of the source station, and solve the problems that after a CDN technology is adopted in the prior art, the original program for acquiring the IP address of the access source cannot be normally used, and the acquired program is not the real IP address of the access source but the IP address of a CDN node.
Referring to fig. 4, fig. 4 illustrates a system for acquiring an IP address of a source station according to an embodiment of the present application, where the system 400 includes: an access IP address module 401, configured to obtain an IP address set, determine whether an IP address in the IP address set is alive, if yes, store the alive IP address as a first IP address set, and request to access the IP address in the first IP address set through HTTPS; a source station IP address obtaining module 402, configured to obtain return information that the HTTPS requests to access, determine whether the return information includes a domain name, if yes, establish a relationship between the domain name and an IP address in a first IP address set, and use the IP address with the established relationship as a source station IP address of the domain name.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present application may be implemented in one module. Any one or more of the modules, sub-modules, units and sub-units according to the embodiments of the present application may be implemented by being split into a plurality of modules.
Fig. 5 schematically shows a block diagram of an electronic device according to an embodiment of the application.
As shown in fig. 5, the electronic device 500 includes a processor 501 and a memory 502. The electronic device 500 may perform a method according to an embodiment of the application.
In particular, processor 501 may include, for example, a general purpose microprocessor, an instruction set processor and/or related chip set and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), and/or the like. The processor 501 may also include onboard memory for caching purposes. The processor 701 may be a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present application.
The memory 502, for example, can be any medium that can contain, store, communicate, propagate, or transport instructions. For example, a readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. Specific examples of the readable storage medium include: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and/or wired/wireless communication links. Which stores a computer executable program which, when executed by the processor, causes the processor to perform the live-air tag adding method as described above.
The present application also provides a computer readable medium, which may be embodied in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer readable medium carries one or more programs which, when executed, implement the method according to an embodiment of the present application.
According to embodiments of the present application, a computer readable medium may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present application, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In this application, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, optical fiber cable, radio frequency signals, etc., or any suitable combination of the foregoing.
It will be appreciated by a person skilled in the art that various combinations and/or combinations of features described in the various embodiments and/or claims of the present application are possible, even if such combinations or combinations are not explicitly described in the present application. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present application may be made without departing from the spirit and teachings of the present application. All such combinations and/or associations are intended to fall within the scope of this application.
While the present application has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the application as defined by the appended claims and their equivalents. Accordingly, the scope of the present application should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (9)

1. A method for obtaining an IP address of a source station, the method comprising:
acquiring an IP address set, judging whether IP addresses in the IP address set are alive or not, if so, storing the alive IP addresses as a first IP address set, and requesting to access the IP addresses in the first IP address set through an HTTPS;
acquiring return information of the HTTPS request access, judging whether the return information contains a domain name, if so, establishing a relation between the domain name and an IP address in a first IP address set, and taking the IP address with the established relation as a source station IP address of the domain name;
the obtaining the return information of the HTTPS request access and judging whether the return information includes a domain name includes:
acquiring an HTTPS certificate in return information of the HTTPS request access;
judging whether the domain name to which the HTTPS certificate belongs is returned in the HTTPS certificate;
and if so, acquiring the domain name to which the HTTPS certificate belongs.
2. The method of claim 1, wherein obtaining the set of IP addresses comprises: and acquiring the IP address under the preset condition, wherein the preset condition comprises a preset area and a preset IP protocol version.
3. The method of claim 1, wherein the determining whether the IP address in the set of IP addresses is alive comprises:
and judging whether the IP addresses in the IP address set are alive or not through a detection tool nmap.
4. The method of claim 1, prior to said determining whether an IP address in the set of IP addresses is alive, further comprising:
acquiring an IP address of a CDN node;
judging whether the IP address set contains the CDN node IP address or not, and if so, deleting the IP address which is the same as the CDN node IP address in the IP address set.
5. The method of claim 4, wherein the obtaining the CDN node IP address comprises:
the CDN node IP address is obtained through an IPIP database or a GeoV2 database.
6. The method according to claim 1, wherein the obtaining of the domain name to which the HTTPS certificate belongs comprises:
judging whether the domain names to which the HTTPS certificates belong are more than two, if so, marking the domain names to which the HTTPS certificates belong as multiple domain names, wherein the multiple domain names point to the same IP address.
7. A system for obtaining an IP address of a source station, the system comprising: the access IP address module is used for acquiring an IP address set, judging whether IP addresses in the IP address set are alive or not, if so, storing the alive IP addresses as a first IP address set, and requesting to access the IP addresses in the first IP address set through HTTPS;
a source station IP address obtaining module, configured to obtain return information that the HTTPS requests to access, and determine whether the return information includes a domain name, if yes, establish a relationship between the domain name and an IP address in a first IP address set, and use the IP address with the established relationship as a source station IP address of the domain name, where the obtaining of the return information that the HTTPS requests to access, and determining whether the return information includes a domain name includes:
acquiring an HTTPS certificate in return information of the HTTPS request access;
judging whether the domain name to which the HTTPS certificate belongs is returned in the HTTPS certificate;
and if so, acquiring the domain name to which the HTTPS certificate belongs.
8. An electronic device, characterized in that the device comprises:
a processor;
a memory storing a computer executable program which, when executed by the processor, causes the processor to perform the method of obtaining an IP address of a source station as claimed in any one of claims 1 to 6.
9. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of acquiring an IP address of a source station according to any one of claims 1 to 6.
CN201811596169.2A 2018-12-20 2018-12-25 Method, system, electronic device and medium for acquiring IP address of source station Active CN109451094B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811566289 2018-12-20
CN2018115662898 2018-12-20

Publications (2)

Publication Number Publication Date
CN109451094A CN109451094A (en) 2019-03-08
CN109451094B true CN109451094B (en) 2022-02-22

Family

ID=65537918

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811596169.2A Active CN109451094B (en) 2018-12-20 2018-12-25 Method, system, electronic device and medium for acquiring IP address of source station

Country Status (1)

Country Link
CN (1) CN109451094B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113660095B (en) * 2021-08-06 2022-12-20 杭州安恒信息技术股份有限公司 Method, system, storage medium and terminal device for searching real IP address

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103229479A (en) * 2012-12-28 2013-07-31 华为技术有限公司 Website identification method and device and network system
CN103634422A (en) * 2013-11-29 2014-03-12 北京奇虎科技有限公司 IP (Internet Protocol) address recognition method and device for CDN (Content Distribution Network) source station
CN106230602A (en) * 2016-09-09 2016-12-14 上海携程商务有限公司 The integrity detection system of the certificate chain of digital certificate and method
CN108390955A (en) * 2018-05-09 2018-08-10 网宿科技股份有限公司 Domain Name acquisition method, Website access method and server
CN108574742A (en) * 2017-03-10 2018-09-25 腾讯科技(深圳)有限公司 Domain-name information collection method and domain-name information collection device

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9571452B2 (en) * 2014-07-01 2017-02-14 Sophos Limited Deploying a security policy based on domain names

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103229479A (en) * 2012-12-28 2013-07-31 华为技术有限公司 Website identification method and device and network system
CN103634422A (en) * 2013-11-29 2014-03-12 北京奇虎科技有限公司 IP (Internet Protocol) address recognition method and device for CDN (Content Distribution Network) source station
CN106230602A (en) * 2016-09-09 2016-12-14 上海携程商务有限公司 The integrity detection system of the certificate chain of digital certificate and method
CN108574742A (en) * 2017-03-10 2018-09-25 腾讯科技(深圳)有限公司 Domain-name information collection method and domain-name information collection device
CN108390955A (en) * 2018-05-09 2018-08-10 网宿科技股份有限公司 Domain Name acquisition method, Website access method and server

Also Published As

Publication number Publication date
CN109451094A (en) 2019-03-08

Similar Documents

Publication Publication Date Title
US9942130B2 (en) Selective routing of network traffic for remote inspection in computer networks
CN106068639B (en) The Transparent Proxy certification handled by DNS
US9288231B2 (en) Web caching with security as a service
CN111885123A (en) Construction method and device of cross-K8 s target service access channel
US10931695B2 (en) Nonce injection and observation system for detecting eavesdroppers
CN109391635B (en) Data transmission method, device, equipment and medium based on bidirectional gatekeeper
CN109088909B (en) Service gray level publishing method and device based on merchant type
CN109167780B (en) Method, device, system and medium for controlling resource access
CN108881308A (en) A kind of user terminal and its authentication method, system, medium
CN105981009A (en) Caching of encrypted content
CN103997479B (en) A kind of asymmetric services IP Proxy Methods and equipment
CN112491836B (en) Communication system, method, device and electronic equipment
CN109788050B (en) Method, system, electronic device and medium for acquiring IP address of source station
CN109451094B (en) Method, system, electronic device and medium for acquiring IP address of source station
KR101622876B1 (en) Apparatus and method for blocking access to unallowable site
CN104811507A (en) IP address acquiring method and IP address acquiring device
CN110995763B (en) Data processing method and device, electronic equipment and computer storage medium
CN101945053B (en) Method and device for transmitting message
CN103634289B (en) Communication shield device and communication screen method
CN110943962B (en) Authentication method, network equipment, authentication server and forwarding equipment
US9413553B2 (en) Network access control based on risk factor
CN104253797A (en) Identification method and device for worm virus
US10320751B2 (en) DNS server selective block and DNS address modification method using proxy
CN109167714B (en) Method, system, device and medium for terminal in IPV4 network to access IPV6 network
JP5738042B2 (en) Gateway device, information processing device, processing method, and program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100088 Building 3 332, 102, 28 Xinjiekouwai Street, Xicheng District, Beijing

Applicant after: Qianxin Technology Group Co., Ltd.

Address before: 100088 Building 3 332, 102, 28 Xinjiekouwai Street, Xicheng District, Beijing

Applicant before: BEIJING QI'ANXIN SCIENCE & TECHNOLOGY CO., LTD.

GR01 Patent grant
GR01 Patent grant