CN109981365A - Data decryptor method, apparatus, user equipment and storage medium - Google Patents

Data decryptor method, apparatus, user equipment and storage medium Download PDF

Info

Publication number
CN109981365A
CN109981365A CN201910236825.6A CN201910236825A CN109981365A CN 109981365 A CN109981365 A CN 109981365A CN 201910236825 A CN201910236825 A CN 201910236825A CN 109981365 A CN109981365 A CN 109981365A
Authority
CN
China
Prior art keywords
address
monitored
network service
service application
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910236825.6A
Other languages
Chinese (zh)
Other versions
CN109981365B (en
Inventor
周波
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen City Branch Power Technology Co Ltd
Original Assignee
Shenzhen City Branch Power Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen City Branch Power Technology Co Ltd filed Critical Shenzhen City Branch Power Technology Co Ltd
Priority to CN201910236825.6A priority Critical patent/CN109981365B/en
Publication of CN109981365A publication Critical patent/CN109981365A/en
Application granted granted Critical
Publication of CN109981365B publication Critical patent/CN109981365B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0813Configuration setting characterised by the conditions triggering a change of settings
    • H04L41/0816Configuration setting characterised by the conditions triggering a change of settings the condition being an adaptation, e.g. in response to network events
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Automation & Control Theory (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of data decryptor method, apparatus, user equipment and storage mediums.The present invention is by configuring IP address to be configured for the IP address of local network interface card, the IP address of default network interface card is configured according to IP address to be monitored, established in the operating system IP address to be configured to listening port and the IP address to be monitored to the data forwarding rule between listening port so that the network service application realizes that port data is monitored.Compared with prior art, the present embodiment is in rebuilding process, any configuration in modification network service application is not needed, but the new network configuration of automatic adaptation, without being concerned about the IP address saved in the network service application, guarantees that network service application can be realized external offer service, all network service applications can be compatible with, the complexity for substantially reducing reconstruction improves the success rate of reconstruction.

Description

Data decryptor method, apparatus, user equipment and storage medium
Technical field
The present invention relates to technical field of data security more particularly to a kind of data decryptor method, apparatus, user equipment and deposit Storage media.
Background technique
It is existing to be similar to the network service applications such as Web, database, it usually needs to monitor transmission control protocol The port (Transmission Control Protocol, TCP) or User Datagram Protocol (User Datagram Protocol, UDP) port is to provide address of service, but when monitoring, it will usually by following 3 kinds of modes for network Attendant application uses:
Mode 1, local loopback address, i.e. 127.0.0.1, this address can only native internal communications.
Mode 2,0.0.0.0, the designated port in all IP address all initiate to monitor.
Mode 3, specified IP are monitored.Only monitor the designated port of some IP address.
Network service application is designed as monitoring using specified IP address, and this IP address is saved in note Any positions such as volume table, start up with command-line options parameter or configuration file.
When network service application starts in computer A, previously stored IP address is obtained (assuming that IP address is 192.168.1.3), port snoop then is carried out from this IP address, it is assumed that the IP address phase of the IP address of computer A and preservation Service can be externally provided at this point, port snoop is normal with (i.e. the IP address of computer A is also 192.168.1.3).
When network service application is reconstructed into computer B, be used when external physical environment or former IP address or In the case of other, when computer B cannot use the IP address of computer A, the IP address of computer B can change (false at this time If the IP address after variation is 172.16.1.6), and network service application still can read the IP address of preservation 192.168.1.3 come to carry out port snoop to operating system, but since the IP address of computer B is 172.16.1.6, at this time can Failure is monitored, causes network service application not can be carried out work, service also cannot be externally provided.
The IP address 192.168.1.3 that network service application before is saved can only be revised as at this time 172.16.1.6, but since heterogeneous networks attendant application can use different designs, ununified standard leads to not Full automatic realization migration, needs manpower intervention, and operator can not generally also know clearly the preservation position of IP address It sets, needs to find the assistance of the software developer of network service application, heavy workload is complicated for operation.
Above content is only used to facilitate the understanding of the technical scheme, and is not represented and is recognized that above content is existing skill Art.
Summary of the invention
The main purpose of the present invention is to provide a kind of data decryptor method, apparatus, user equipment and storage mediums, it is intended to After solving network services application program reconstruction in the prior art, need to modify the IP address saved in network service application, Cause to rebuild the technical issues of complexity is high and success rate is told somebody what one's real intentions are.
To achieve the above object, the present invention provides a kind of data decryptor method, the described method comprises the following steps:
When network service application is rebuild, default reconstruction parameter is obtained;
The IP to be monitored of IP address to be configured, the network service application is extracted from the default reconstruction parameter Location and the network service application to listening port;
The IP address to be configured is configured by the IP address of local network interface card;
The IP address of default network interface card is configured according to the IP address to be monitored;
Established in the operating system IP address to be configured to listening port and the IP address to be monitored To the data forwarding rule between listening port, so that the network service application realizes that port data is monitored.
Preferably, described when network service application is rebuild, before obtaining default reconstruction parameter, the method Further include:
The IP address to be monitored for obtaining network service application, obtains the end to be monitored of the network service application Mouthful, and obtain IP address to be configured;
IP address, the IP address to be monitored of the network service application and the network service to be configured are answered With being added in default reconstruction parameter to listening port for program.
Preferably, described by the IP address to be monitored of the network service application, the network service application Be added in default reconstruction parameter to listening port and IP address to be configured after, the method also includes:
The default reconstruction parameter is shown;
The parameter adjustment instruction for receiving user's input, adjusts the parameter preset according to the parameter adjustment instruction It is whole.
Preferably, the IP address to be monitored for obtaining network service application, specifically includes:
Backup IP address is read from the Backup Data of source computer, using the backup IP address as the network service The IP address to be monitored of application program.
Preferably, it is described obtain the network service application to listening port, specifically include:
Call operation systematic difference Program Interfaces, to obtain the multiple listening ports to be selected for being in listening state; The port that operating system is monitored in the listening port to be selected is removed, is taken using remaining listening port to be selected as the network Be engaged in application program to listening port.
Or,
The process for identifying the network service application is obtained by the application programming interface of the operating system The listening port that the process is monitored, using the listening port of acquisition as the network service application to listening port.
Preferably, described to obtain IP address to be configured, it specifically includes:
In response to the network configuration information of user's input, with determining corresponding IP to be configured according to the network configuration information Location.
Preferably, before the IP address to be monitored according to configures the IP address for presetting network interface card, the method is also wrapped It includes:
Judge whether the IP address to be monitored and IP address to be configured are identical, in the IP address to be monitored and to be configured When IP address is not identical, the step of IP address to be monitored according to configures the IP address of default network interface card is executed.
In addition, to achieve the above object, the present invention also provides a kind of user equipment, the user equipment include: memory, Processor and it is stored in the data decryptor program that can be run on the memory and on the processor, the data decryptor journey Sequence is arranged for carrying out the step of data decryptor method as described above.
In addition, to achieve the above object, it is described computer-readable the present invention also provides a kind of computer readable storage medium Data decryptor program is stored on storage medium, the data decryptor program realizes data as described above when being executed by processor The step of monitor method.
In addition, to achieve the above object, the present invention also provides a kind of data decryptor device, described device includes:
Parameter acquisition module, for when network service application is rebuild, obtaining default reconstruction parameter;
Data extraction module, for extracted from the default reconstruction parameter network service application wait monitor IP address, the network service application to listening port and IP address to be configured;
Address configuration module, for configuring the IP address to be configured for the IP address of local network interface card;
Address virtual module, for configuring the IP address of default network interface card according to the IP address to be monitored;
Rule establishes module, for established in the operating system IP address to be configured to listening port and institute The regular to the data forwarding between listening port of IP address to be monitored is stated, so that the network service application realizes port Data decryptor.
The present invention is configured pre- by configuring IP address to be configured for the IP address of local network interface card according to IP address to be monitored If the IP address of network interface card, established in the operating system IP address to be configured to listening port and the IP to be monitored Address between listening port data forwarding rule so that the network service application realize port data monitor. Compared with prior art, the present embodiment does not need any configuration in modification network service application in rebuilding process, But the new network configuration of automatic adaptation guarantees net without being concerned about the IP address that saves in the network service application Network attendant application can be realized external offer service, can be compatible with all network service applications, substantially reduce The complexity of reconstruction improves the success rate of reconstruction.
Detailed description of the invention
Fig. 1 is the user device architecture schematic diagram for the hardware running environment that the embodiment of the present invention is related to;
Fig. 2 is the flow diagram of data decryptor method first embodiment of the present invention;
Fig. 3 is the flow diagram of data decryptor method second embodiment of the present invention;
Fig. 4 is the structural block diagram of data decryptor device first embodiment of the present invention.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
Referring to Fig.1, Fig. 1 is the structural representation of the user equipment for the hardware running environment that the embodiment of the present invention is related to Figure.
As shown in Figure 1, the user equipment may include: processor 1001, such as CPU, communication bus 1002, user interface 1003, network interface 1004, memory 1005.Wherein, communication bus 1002 is for realizing the connection communication between these components. User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard), optional user interface 1003 can also include standard wireline interface and wireless interface.Network interface 1004 optionally may include that the wired of standard connects Mouth, wireless interface (such as WI-FI interface).Memory 1005 can be high speed RAM memory, be also possible to stable memory (non-volatile memory), such as magnetic disk storage.Memory 1005 optionally can also be independently of aforementioned processor 1001 storage device.
It should be noted that the user equipment can be the equipment such as computer, laptop or tablet computer, this implementation Example is without restriction to this.
It will be understood by those skilled in the art that structure shown in Fig. 1 does not constitute the restriction to user equipment, can wrap It includes than illustrating more or fewer components, perhaps combines certain components or different component layouts.
As shown in Figure 1, as may include that operating system, network are logical in a kind of memory 1005 of computer storage medium Believe module, Subscriber Interface Module SIM and data decryptor program.
In user equipment shown in Fig. 1, network interface 1004 is mainly used for carrying out data communication with external network;User Interface 1003 is mainly used for receiving the input instruction of user;The user equipment is called in memory 1005 by processor 1001 The data decryptor program of storage, and execute following operation:
When network service application is rebuild, default reconstruction parameter is obtained;
The IP to be monitored of IP address to be configured, the network service application is extracted from the default reconstruction parameter Location and the network service application to listening port;
The IP address to be configured is configured by the IP address of local network interface card;
The IP address of default network interface card is configured according to the IP address to be monitored;
Established in the operating system IP address to be configured to listening port and the IP address to be monitored To the data forwarding rule between listening port, so that the network service application realizes that port data is monitored.
Further, processor 1001 can call the data decryptor program stored in memory 1005, also execute following Operation:
The IP address to be monitored for obtaining network service application, obtains the end to be monitored of the network service application Mouthful, and obtain IP address to be configured;
IP address, the IP address to be monitored of the network service application and the network service to be configured are answered With being added in default reconstruction parameter to listening port for program.
Further, processor 1001 can call the data decryptor program stored in memory 1005, also execute following Operation:
The default reconstruction parameter is shown;
The parameter adjustment instruction for receiving user's input, adjusts the parameter preset according to the parameter adjustment instruction It is whole.
Further, processor 1001 can call the data decryptor program stored in memory 1005, also execute following Operation:
Backup IP address is read from the Backup Data of source computer, using the backup IP address as the network service The IP address to be monitored of application program.
Further, processor 1001 can call the data decryptor program stored in memory 1005, also execute following Operation:
Call operation systematic difference Program Interfaces, to obtain the multiple listening ports to be selected for being in listening state; The port that operating system is monitored in the listening port to be selected is removed, is taken using remaining listening port to be selected as the network Be engaged in application program to listening port.
Or,
The process for identifying the network service application is obtained by the application programming interface of the operating system The listening port that the process is monitored, using the listening port of acquisition as the network service application to listening port.
Further, processor 1001 can call the data decryptor program stored in memory 1005, also execute following Operation:
In response to the network configuration information of user's input, with determining corresponding IP to be configured according to the network configuration information Location.
Further, processor 1001 can call the data decryptor program stored in memory 1005, also execute following Operation:
Judge whether the IP address to be monitored and IP address to be configured are identical, in the IP address to be monitored and to be configured When IP address is not identical, the step of IP address to be monitored according to configures the IP address of default network interface card is executed.
The present embodiment through the above scheme, by configuring IP address to be configured for the IP address of local network interface card, according to The IP address that IP address configures default network interface card is monitored, the end to be monitored of the IP address to be configured is established in the operating system Mouthful and the IP address to be monitored between listening port data forwarding rule so that the network service application is real Existing port data is monitored.Compared with prior art, the present embodiment does not need modification network and is served by journey in rebuilding process Any configuration in sequence, but the new network configuration of automatic adaptation, save without being concerned about in the network service application IP address, guarantee that network service application can be realized external offer service, all networks can be compatible with and be served by Program substantially reduces the complexity of reconstruction, improves the success rate of reconstruction.
Based on above-mentioned hardware configuration, data decryptor embodiment of the method for the present invention is proposed.
It is the flow diagram of data decryptor method first embodiment of the present invention referring to Fig. 2, Fig. 2.
In the first embodiment, the data decryptor method the following steps are included:
S10: when network service application is rebuild, default reconstruction parameter is obtained.
It should be noted that the network service application as can provide the application program of network service, such as: The application programs such as Web, database, the present embodiment are without restriction to this.
It will be appreciated that the default reconstruction parameter is the required parameter used when being rebuild.
Operating system and application system are rebuild after disaster occurs for computer system it should be understood that rebuilding and referring to System, and restore the process of business function;Or the operating system of computer system and application system are moved into new computer, And provide the process of identical services function.
In the concrete realization, when process is rebuild in starting, it can be user and start at once, be also possible to default reconstruction parameter It saves, restarts later, the present embodiment does not limit the Starting mode (by hand, delay, automatic etc.) of flow-reconstituted journey.
S20: extracted from the default reconstruction parameter IP address to be configured, the network service application wait monitor IP address and the network service application to listening port.
In the concrete realization, the default reconstruction parameter can include: IP address to be configured, the network service application IP address to be monitored and the network service application to listening port, therefore, can be from the default reconstruction parameter Extract IP address to be configured, the IP address to be monitored of the network service application and the network service application to Listening port.
S30: the IP address to be configured is configured by the IP address of local network interface card.
It will be appreciated that the executing subject due to this method is user equipment, local network interface card is the user equipment Network interface card, after configuring the IP address to be configured for the IP address of the local network interface card, the IP address of the user equipment is For the IP address to be configured.
S40: the IP address of default network interface card is configured according to the IP address to be monitored.
It will be appreciated that the default network interface card can be physical network card, and it can also be Microsoft Loopback Adapter, it is certainly, described in order to prevent IP address conflict in IP address to be monitored and local area network, can be used Microsoft Loopback Adapter, avoids address conflict.
It should be noted that the IP address to be monitored is IP that the network service application needs to monitor Location, it is generally the case that the network service application, in order to realize external offer service, needs before being rebuild Port snoop is carried out to the IP address of source computer, therefore the IP address to be monitored is the IP address of source computer, and The network service application can save IP address to be monitored, even if the network service application is rebuild Afterwards, the IP address to be monitored still can be saved, and port snoop is carried out to the IP address to be monitored.
In the concrete realization, the network service application is usually different in IP address to be monitored and IP address to be configured It when cause, just will appear the problem of monitoring fails, therefore, can first judge the IP address to be monitored and wait match before step S40 It whether identical sets IP address, described when monitoring IP address and IP address to be configured is not identical, then executes step S40.
Certainly, it is described wait monitor IP address it is identical with IP address to be configured when, be not in port snoop failure ask Topic, can save at this time by the IP address to be monitored and to listening port, without carrying out the subsequent step of the present embodiment.
S50: established in the operating system IP address to be configured to listening port and the IP to be monitored Location between listening port data forwarding rule so that the network service application realize port data monitor.
In the concrete realization, after establishing forward rule in operating system, when operating system receive it is described to be configured IP address when the data packet of listening port, which can be forwarded to the IP address to be monitored to listening port.
Assuming that IP address to be configured is 172.16.1.6, the IP address to be monitored is 192.168.1.3, and interface is described Turning to listening port and the 192.168.1.3 to the data between listening port for 172.16.1.6 is established in operating system Hair rule, at this point, the network service application can monitor 192.168.1.3 to listening port so that network service Application program can be realized external offer service, and in a network, the application program of remaining host can also pass through 172.16.1.6 access the network service application to listening port.
The present embodiment is configured by configuring IP address to be configured for the IP address of local network interface card according to IP address to be monitored The IP address of default network interface card, established in the operating system IP address to be configured to listening port and described wait monitor IP address between listening port data forwarding rule so that the network service application realize port data prison It listens.Compared with prior art, the present embodiment does not need any matching in modification network service application in rebuilding process It sets, but the new network configuration of automatic adaptation guarantees without being concerned about the IP address saved in the network service application Network service application can be realized external offer service, can be compatible with all network service applications, substantially lower The complexity rebuild, improves the success rate of reconstruction.
Further, as shown in figure 3, proposing data decryptor method second embodiment of the present invention based on first embodiment, In the present embodiment, before step S10, the method also includes:
S01: obtaining the IP address to be monitored of network service application, obtain the network service application wait supervise Port is listened, and obtains IP address to be configured.
Since heterogeneous networks attendant application can use different designs, ununified standard, so the network The IP address to be monitored that attendant application saves usually is not easy to obtain, since the Backup Data of source computer usually has source The IP address of computer, and the IP to be monitored that the IP address of the source computer is usually saved with the network service application Address one is consistent, therefore, backup IP address can be read from the Backup Data of source computer, using the backup IP address as institute State the IP address to be monitored of network service application.
For convenient for obtain the network service application to listening port, in the present embodiment, following two can be passed through Mode obtains:
First way are as follows: call operation systematic difference Program Interfaces API is more in listening state to obtain A listening port to be selected;The port that operating system is monitored in the listening port to be selected is removed, by remaining monitoring end to be selected Mouth is as the network service application to listening port.
The second way are as follows: the process for identifying the network service application is obtained by the API of the operating system The listening port that the process is monitored, using the listening port of acquisition as the network service application to listening port.
Certainly, also can be used other modes obtain the network service application to listening port, the present embodiment pair This is without restriction.
For in the present embodiment, the IP to be configured can be generated at random according to preset rules convenient for obtaining IP address to be configured Address in order to meet user demand, may also respond to the network configuration information of user's input, according to the network configuration certainly Information determines corresponding IP address to be configured.
S02: IP address, the IP address to be monitored of the network service application and the network to be configured are taken Business application program is added in default reconstruction parameter to listening port.
Since above-mentioned default reconstruction parameter is to obtain automatically, the specific demand of user, therefore, this implementation may be unsatisfactory for In example, the default reconstruction parameter can be shown;The parameter adjustment instruction for receiving user's input again, according to the parameter tune Whole instruction is adjusted the parameter preset.
Certainly, it when showing the default reconstruction parameter, described can will also be carried out to the corresponding business service of listening port Prompt, it is assumed that described to listening port is 1433 ports, can determine that the business service is database service at this time, can be aobvious Show the prompt information that display data library services in interface.
In the concrete realization, the parameter adjustment instruction parameter preset can be added/be modified and enabled/ Disabling, certainly, can also carry out other operations, the present embodiment is without restriction to this.
Illustrate the present invention below with two specific examples, but the scope of protection of the present invention is not limited.
Example one, the original ip address for assuming source computer are that 192.168.1.3/24 (wherein ,/24 represents subnet mask For 255.255.255.0), the network address after reconstruction is 172.16.1.6/24.Before reconstruction, the operation system of the source computer Have a network service application in system is 1433 ports to listening port.
Detailed process can follow the steps below:
IP address 172.16.1.6/24 to be configured expected after reconstruction is configured to default reconstruction parameter by step 1, user In.
Step 2, user configure an IP address 192.168.1.3/24 to be monitored in default reconstruction parameter.
Step 3, user configure a port forward rule: all in 192.168.1.3/24 in default reconstruction parameter The monitoring that port is 1433, is forwarded to 1433 ports of 172.16.1.6/24.That is network service application is monitored 192.168.1.3/24 the effect of 1433 ports, the effect with monitoring in 1433 ports of 172.16.1.6/24 are consistent.
Process is rebuild in step 4, starting, is realized and is rebuild according to above-mentioned default reconstruction parameter, established in the operating system The forward rule.
Step 5, the network service application can monitor 1433 ports of 192.168.1.3/24, so that network takes Business application program can be realized external offer service, and in a network, the application program of remaining host can also pass through 172.16.1.6 access the network service application to listening port.
Example two, the original ip address for also assuming that source computer are that 192.168.1.3/24 (wherein ,/24 represents subnet Mask is 255.255.255.0), the network address after reconstruction is 172.16.1.6/24.Before reconstruction, the behaviour of the source computer Make to have in system a network service application is 1433 ports to listening port.
Network address 172.16.1.6/24 expected after reconstruction is configured in default reconstruction parameter by step 1, user.
Step 2 provides proposed parameter for user:
It (1) can (or network when rebuilding in the Backup Data of source computer be matched according to the network configuration information of backup time Set), after being inferred to reconstruction, operating system will lose network address 192.168.1.3/24;
(2) network service application can be inquired from source computer to monitor in 192.168.1.3/24 On 1433 ports;
(3) by port numbers, it can speculate that the network service is the database service of certain software vendor;
(4) reconstruction parameter of recommendation is generated for user:
1. configuring an IP address 192.168.1.3/24 to be monitored;
2. configuring a port forward rule: all monitorings for being 1433 in the port 192.168.1.3/24 are forwarded to 172.16.1.6/24 1433 ports;
3. prompting user, the above rule is generated in order to which the database service of certain software vendor can work normally.
Step 3, user can be added/modify to above-mentioned proposed parameter as needed, enabled/disabled, be preset Reconstruction parameter.
Process is rebuild in step 4, starting, is realized and is rebuild according to above-mentioned default reconstruction parameter, established in the operating system The forward rule.
Step 5, the network service application can monitor 1433 ports of 192.168.1.3/24, so that network takes Business application program can be realized external offer service, and in a network, the application program of remaining host can also pass through 172.16.1.6 access the network service application to listening port.
In addition, the embodiment of the present invention also proposes a kind of computer readable storage medium, the computer readable storage medium On be stored with data decryptor program, following operation is realized when the data decryptor program is executed by processor:
When network service application is rebuild, default reconstruction parameter is obtained;
The IP to be monitored of IP address to be configured, the network service application is extracted from the default reconstruction parameter Location and the network service application to listening port;
The IP address to be configured is configured by the IP address of local network interface card;
The IP address of default network interface card is configured according to the IP address to be monitored;
Established in the operating system IP address to be configured to listening port and the IP address to be monitored To the data forwarding rule between listening port, so that the network service application realizes that port data is monitored.
The data decryptor program of the present embodiment can also be used in each step for realizing above-mentioned data decryptor method, no longer superfluous herein It states.
In addition, the embodiment of the present invention also proposes a kind of data decryptor device, referring to Fig. 4, described device includes:
Parameter acquisition module 401, for when network service application is rebuild, obtaining default reconstruction parameter;
Data extraction module 402, for extracted from the default reconstruction parameter network service application to Monitor IP address, the network service application to listening port and IP address to be configured;
Address configuration module 403, for configuring the IP address to be configured for the IP address of local network interface card;
Address virtual module 404, for configuring the IP address of default network interface card according to the IP address to be monitored;
Rule establishes module 405, for established in the operating system IP address to be configured to listening port And the IP address to be monitored is regular to the data forwarding between listening port, so that the network service application is realized Port data is monitored.
Each module of the present embodiment can also be used in each step for realizing above-mentioned data decryptor method, and details are not described herein.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone, Computer, user equipment, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of data decryptor method, which is characterized in that the described method comprises the following steps:
When network service application is rebuild, default reconstruction parameter is obtained;
Extracted from the default reconstruction parameter IP address to be configured, the IP address to be monitored of the network service application and The network service application to listening port;
The IP address to be configured is configured by the IP address of local network interface card;
The IP address of default network interface card is configured according to the IP address to be monitored;
Established in the operating system IP address to be configured to listening port and the IP address to be monitored wait supervise The data forwarding rule between port is listened, so that the network service application realizes that port data is monitored.
2. the method as described in claim 1, which is characterized in that it is described when network service application is rebuild, it obtains Before default reconstruction parameter, the method also includes:
The IP address to be monitored for obtaining network service application, obtain the network service application to listening port, And obtain IP address to be configured;
IP address, the IP address to be monitored of the network service application and the network to be configured are served by journey Sequence is added in default reconstruction parameter to listening port.
3. method according to claim 2, which is characterized in that the IP to be monitored by the network service application After location, being added in default reconstruction parameter to the listening port and IP address to be configured of network service application, institute State method further include:
The default reconstruction parameter is shown;
The parameter adjustment instruction for receiving user's input, is adjusted the parameter preset according to the parameter adjustment instruction.
4. method according to claim 2, which is characterized in that the IP to be monitored for obtaining network service application Location specifically includes:
Backup IP address is read from the Backup Data of source computer, is served by using the backup IP address as the network The IP address to be monitored of program.
5. method according to claim 2, which is characterized in that the end to be monitored for obtaining the network service application Mouthful, it specifically includes:
Call operation systematic difference Program Interfaces, to obtain the multiple listening ports to be selected for being in listening state;Removal The port that operating system is monitored in the listening port to be selected is answered remaining listening port to be selected as the network service With program to listening port.
Or,
The process for identifying the network service application, obtained by the application programming interface of the operating system described in The listening port that process is monitored, using the listening port of acquisition as the network service application to listening port.
6. method according to claim 2, which is characterized in that it is described to obtain IP address to be configured, it specifically includes:
In response to the network configuration information of user's input, corresponding IP address to be configured is determined according to the network configuration information.
7. such as method according to any one of claims 1 to 6, which is characterized in that the IP address to be monitored according to is matched Before the IP address for setting default network interface card, the method also includes:
Judge whether the IP address to be monitored and IP address to be configured are identical, in the IP address to be monitored and IP to be configured When location is not identical, the step of IP address to be monitored according to configures the IP address of default network interface card is executed.
8. a kind of user equipment, which is characterized in that the user equipment includes: memory, processor and is stored in the storage On device and the data decryptor program that can run on the processor, the data decryptor program are arranged for carrying out such as claim Described in any one of 1 to 7 the step of data decryptor method.
9. a kind of computer readable storage medium, which is characterized in that be stored with data prison on the computer readable storage medium Program is listened, the data decryptor as described in any one of claims 1 to 7 is realized when the data decryptor program is executed by processor The step of method.
10. a kind of data decryptor device, which is characterized in that described device includes:
Parameter acquisition module, for when network service application is rebuild, obtaining default reconstruction parameter;
Data extraction module, for extracting from the default reconstruction parameter IP to be monitored of the network service application Location, the network service application to listening port and IP address to be configured;
Address configuration module, for configuring the IP address to be configured for the IP address of local network interface card;
Address virtual module, for configuring the IP address of default network interface card according to the IP address to be monitored;
Rule establishes module, for established in the operating system IP address to be configured to listening port and it is described to The regular to the data forwarding between listening port of IP address is monitored, so that the network service application realizes port data It monitors.
CN201910236825.6A 2019-03-26 2019-03-26 Data monitoring method and device, user equipment and storage medium Active CN109981365B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910236825.6A CN109981365B (en) 2019-03-26 2019-03-26 Data monitoring method and device, user equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910236825.6A CN109981365B (en) 2019-03-26 2019-03-26 Data monitoring method and device, user equipment and storage medium

Publications (2)

Publication Number Publication Date
CN109981365A true CN109981365A (en) 2019-07-05
CN109981365B CN109981365B (en) 2022-03-25

Family

ID=67080715

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910236825.6A Active CN109981365B (en) 2019-03-26 2019-03-26 Data monitoring method and device, user equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109981365B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111082996A (en) * 2019-12-29 2020-04-28 山东英信计算机技术有限公司 Automatic configuration method, device and medium for in-band monitoring software

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075374A (en) * 2009-11-25 2011-05-25 天津中兴软件有限责任公司 Method and system for reconstructing single-ring network topology
CN104317645A (en) * 2014-10-20 2015-01-28 北京国双科技有限公司 Method and device of monitoring port by virtue of application program embodiment
CN104601570A (en) * 2015-01-13 2015-05-06 国家电网公司 Network security monitoring method based on bypass monitoring and software packet capturing technology
CN105450782A (en) * 2016-01-15 2016-03-30 网宿科技股份有限公司 A method and system for restart network service without package losses and machine halt

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102075374A (en) * 2009-11-25 2011-05-25 天津中兴软件有限责任公司 Method and system for reconstructing single-ring network topology
CN104317645A (en) * 2014-10-20 2015-01-28 北京国双科技有限公司 Method and device of monitoring port by virtue of application program embodiment
CN104601570A (en) * 2015-01-13 2015-05-06 国家电网公司 Network security monitoring method based on bypass monitoring and software packet capturing technology
CN105450782A (en) * 2016-01-15 2016-03-30 网宿科技股份有限公司 A method and system for restart network service without package losses and machine halt

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111082996A (en) * 2019-12-29 2020-04-28 山东英信计算机技术有限公司 Automatic configuration method, device and medium for in-band monitoring software
CN111082996B (en) * 2019-12-29 2022-05-27 山东英信计算机技术有限公司 Automatic configuration method, device and medium for in-band monitoring software

Also Published As

Publication number Publication date
CN109981365B (en) 2022-03-25

Similar Documents

Publication Publication Date Title
US6684397B1 (en) Auto-install apparatus and method
CN106126273B (en) A kind of method of upgrading BIOS
CN109768871A (en) Configure method, host and the storage medium of multiple Microsoft Loopback Adapters
KR20060051932A (en) Updating software while it is running
CN109725950B (en) Method, device and storage medium for realizing single-instance operation of client
US10404568B2 (en) Agent manager for distributed transaction monitoring system
CN114780080A (en) Micro front end integration method, device and monitoring method
CN103888491A (en) Diskless workstation start system and method
CN107526584B (en) Data access method and device
CN106161086B (en) The control method and device that master control borad is restarted
CN109857464A (en) System and method for Platform deployment and operation Mobile operating system
CN109284153A (en) Method, relevant device and the computer media of single machine experience multiple operating system
CN110795205B (en) System and method for providing cloud service based on software container
CN114124697A (en) Network switching method, network switching device and storage medium
CN108880864A (en) Business network automatic recovery method, device, calamity are for platform and storage medium
CN110912725A (en) Configuration method and configuration device of OpenFlow virtual switch
CN109981365A (en) Data decryptor method, apparatus, user equipment and storage medium
CN112099902A (en) Network adapter configuration method and device of virtual machine, electronic device and storage medium
CN110336712B (en) Method and device for capturing empty packet by mobile terminal, storage medium and mobile terminal
CN111901395A (en) Multi-cluster switching method and device
CN110851166A (en) User-unaware application program updating method and device and computer equipment
WO2017096889A1 (en) Method and device for upgrading and downgrading system
CN115102999B (en) DevOps system, service providing method, storage medium and electronic device
US11797334B1 (en) BMC parameter configuration and effect-taking method and apparatus, device, and medium
JP2006113754A (en) Software update device and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant