CN110572375A - IP address proxy method and device - Google Patents

IP address proxy method and device Download PDF

Info

Publication number
CN110572375A
CN110572375A CN201910773505.4A CN201910773505A CN110572375A CN 110572375 A CN110572375 A CN 110572375A CN 201910773505 A CN201910773505 A CN 201910773505A CN 110572375 A CN110572375 A CN 110572375A
Authority
CN
China
Prior art keywords
address
appointed
identifier
proxy
preset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910773505.4A
Other languages
Chinese (zh)
Other versions
CN110572375B (en
Inventor
刘浩
柳超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Dike Technology Co Ltd
Original Assignee
Beijing Dike Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Dike Technology Co Ltd filed Critical Beijing Dike Technology Co Ltd
Priority to CN201910773505.4A priority Critical patent/CN110572375B/en
Publication of CN110572375A publication Critical patent/CN110572375A/en
Application granted granted Critical
Publication of CN110572375B publication Critical patent/CN110572375B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/951Indexing; Web crawling techniques
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/50Address allocation
    • H04L61/5007Internet protocol [IP] addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0272Virtual private networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services
    • H04L67/565Conversion or adaptation of application format or content
    • H04L67/5651Reducing the amount or size of exchanged application data

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

the disclosure relates to an IP address proxy method, device, electronic equipment and storage medium. Wherein, the method comprises the following steps: acquiring an IP address of appointed configuration through VPS service, wherein the IP address of the appointed configuration is an agent IP address which is distributed according to a preset address identifier to be configured and meets the appointed requirement; verifying whether the appointed configured IP address is an agent IP address meeting the appointed requirement; and if so, sending a data acquisition request to the FPRS equipment according to the appointed configured IP address. The method and the device realize the IP address proxy based on the VPS service, ensure the quality of the IP address and the safety of transmission data, and solve the problem that data acquisition cannot be carried out due to the attribution of the IP address.

Description

IP address proxy method and device
Technical Field
The present disclosure relates to the field of internet, and in particular, to an IP address proxy method, apparatus, electronic device, and computer-readable storage medium.
Background
The web crawler is a program or script for automatically capturing internet information according to a certain rule. The web crawlers can acquire the network data in batches according to the specified rules, and the labor cost is reduced to a great extent.
However, many malicious crawlers occupy a lot of data and network resources while acquiring network data, which affects normal network usage. Therefore, with the development of network security, many websites set certain restrictions on data acquisition performed by the data acquisition end, for example, by adding an IP attribution detection function, once the data acquisition end is detected to be a crawler program, the data acquisition end is denied access and acquisition. However, in practical applications, there are a lot of scenarios that require data acquisition through an agent, and therefore how to capture data on the basis of ensuring data acquisition security is a technical problem to be solved urgently at present.
It is to be noted that the information disclosed in the above background section is only for enhancement of understanding of the background of the present disclosure, and thus may include information that does not constitute prior art known to those of ordinary skill in the art.
Disclosure of Invention
An object of the present disclosure is to provide an IP address proxy method, apparatus, electronic device, and computer-readable storage medium, thereby overcoming, at least to some extent, one or more of the problems due to the limitations and disadvantages of the related art.
according to one aspect of the present disclosure, an IP address proxy method is provided, which is applied to an FPRC device, and includes:
acquiring an IP address of appointed configuration through VPS service, wherein the IP address of the appointed configuration is an agent IP address which is distributed according to a preset address identifier to be configured and meets the appointed requirement;
Verifying whether the appointed configured IP address is an agent IP address meeting the appointed requirement;
and if so, sending a data acquisition request to the FPRS equipment according to the appointed configured IP address.
In an exemplary embodiment of the present disclosure, verifying whether the IP address of the specified configuration is a proxy IP address that satisfies a specified requirement includes:
Sending an IP address verification message to an IP address verification service through the appointed configured IP address;
receiving a verification response message replied by the IP address verification service, wherein the verification response message comprises an IP address to be verified and address information to be verified;
Matching the IP address to be verified in a preset IP address verification library, and checking whether the IP address to be verified is consistent with the last appointed configured IP address stored in the IP address verification library;
If the IP address to be checked is inconsistent with the last appointed IP address stored in the IP address checking library, further judging whether the address information to be checked is consistent with the address identifier to be configured, if the IP address is inconsistent and the address information to be checked is consistent with the address identifier to be configured, determining that the appointed IP address is an agent IP address meeting the appointed requirement, indicating that the IP address is successfully switched, and storing the agent IP address and the corresponding address identifier into a preset IP address checking library;
and if the IP address to be verified is consistent with the last appointed IP address stored in the IP address verification library, determining that the appointed IP address is an agent IP address which does not meet the appointed requirement, and indicating that the IP address switching fails.
in an exemplary embodiment of the present disclosure, the method includes:
If the IP address switching fails, starting an overtime detection timer;
and after the overtime duration set by the overtime detection timer is reached, the step of verifying whether the appointed configured IP address is the proxy IP address meeting the appointed requirement is executed, and if not, alarm information is sent.
In an exemplary embodiment of the present disclosure, sending a data acquisition request to an FPRS device according to the IP address includes:
And transmitting the data acquisition request through a preset encryption protocol, wherein the preset encryption protocol comprises a TLS protocol.
in an exemplary embodiment of the present disclosure, sending a data acquisition request to an FPRS device according to the IP address includes:
and judging whether the message size of the data acquisition request is larger than or equal to the preset message size, if so, compressing the data acquisition request.
According to another aspect of the present disclosure, there is provided an IP proxy method applied to an FPRS device, the method including:
receiving a data request message sent by FPRC equipment, and acquiring an equipment identifier of the data request message and an IP address of specified configuration, wherein the IP address of the specified configuration is an agent IP address which is distributed according to a preset address identifier to be configured and meets specified requirements;
Determining an interface corresponding to the equipment identifier, adding the corresponding relation between the interface and the equipment identifier and the IP address configured in an appointed mode into a preset interface table entry, and sending the data request message;
Receiving a data response message, acquiring a target IP address of the data response message, searching an interface corresponding to the target IP address according to the preset interface table entry, and sending the data response message to the corresponding FPRC equipment through the interface corresponding to the target IP address.
In one aspect of the present disclosure, an IP address proxy apparatus is provided, which is applied to an FPRC device, and includes:
The IP address acquisition module is used for acquiring an appointed configured IP address through VPS service, wherein the appointed configured IP address is an agent IP address which is distributed according to a preset address identifier to be configured and meets an appointed requirement;
the IP address checking module is used for checking whether the appointed configured IP address is an agent IP address meeting the appointed requirement;
and the data acquisition request sending module is used for sending a data acquisition request to the FPRS equipment according to the appointed configured IP address.
In one aspect of the present disclosure, an IP address proxy apparatus is provided, which is applied to an FPRS device, and includes:
The data acquisition request receiving module is used for receiving a data request message sent by the FPRC equipment, and acquiring an equipment identifier of the data request message and an appointed configured IP address, wherein the appointed configured IP address is an agent IP address which is distributed according to a preset address identifier to be configured and meets an appointed requirement;
A data request message sending module, configured to determine an interface corresponding to the device identifier, add a correspondence between the interface and the device identifier and an IP address assigned to the device identifier to a preset interface table entry, and send the data request message;
And the data response message receiving module is used for receiving a data response message, acquiring a target IP address of the data response message, searching an interface corresponding to the target IP address according to the preset interface table entry, and sending the data response message to the corresponding FPRC equipment through the interface corresponding to the target IP address.
In one aspect of the present disclosure, there is provided an electronic device including:
a processor; and
A memory having computer readable instructions stored thereon which, when executed by the processor, implement a method according to any of the above.
In an aspect of the disclosure, a computer-readable storage medium is provided, on which a computer program is stored, which computer program, when being executed by a processor, realizes the method according to any one of the above.
the IP address proxy method in the exemplary embodiment of the present disclosure obtains an IP address of a designated configuration through a VPS service, wherein the IP address of the designated configuration is a proxy IP address which is distributed according to a preset address identifier to be configured and meets a designated requirement; verifying whether the appointed configured IP address is an agent IP address meeting the appointed requirement; and if so, sending a data acquisition request to the FPRS equipment according to the appointed configured IP address. The method and the device realize the IP address proxy based on the VPS service, ensure the quality of the IP address and the safety of transmission data, and solve the problem that data acquisition cannot be carried out due to the attribution of the IP address.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure.
drawings
The above and other features and advantages of the present disclosure will become more apparent by describing in detail exemplary embodiments thereof with reference to the attached drawings.
Fig. 1 illustrates a flow chart of an IP address proxy method according to an exemplary embodiment of the present disclosure;
Fig. 2 illustrates a flowchart of an IP address proxying method according to another exemplary embodiment of the present disclosure;
fig. 3 shows a schematic block diagram of an IP address proxy apparatus according to an example embodiment of the present disclosure;
Fig. 4 shows a schematic block diagram of an IP address proxy apparatus according to another example embodiment of the present disclosure;
FIG. 5 schematically illustrates a block diagram of an electronic device according to an exemplary embodiment of the present disclosure; and
fig. 6 schematically illustrates a schematic diagram of a computer-readable storage medium according to an exemplary embodiment of the present disclosure.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus, a repetitive description thereof will be omitted.
furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the disclosure. One skilled in the relevant art will recognize, however, that the embodiments of the disclosure can be practiced without one or more of the specific details, or with other methods, components, materials, devices, steps, and so forth. In other instances, well-known structures, methods, devices, implementations, materials, or operations are not shown or described in detail to avoid obscuring aspects of the disclosure.
the block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. That is, these functional entities may be implemented in the form of software, or in one or more software-hardened modules, or in different networks and/or processor devices and/or microcontroller devices.
in this exemplary embodiment, there is first provided an IP address proxy method applied to an FPRC device, and referring to fig. 1, the IP address proxy method may include the following steps:
Step S110, acquiring an IP address of appointed configuration through VPS service, wherein the IP address of the appointed configuration is an agent IP address which is distributed according to a preset address identifier to be configured and meets the appointed requirement;
Step S120, checking whether the appointed configured IP address is an agent IP address meeting the appointed requirement;
and step S130, if yes, sending a data acquisition request to the FPRS equipment according to the specified configured IP address.
The IP address proxy method in the exemplary embodiment of the present disclosure obtains an IP address of a designated configuration through a VPS service, wherein the IP address of the designated configuration is a proxy IP address which is distributed according to a preset address identifier to be configured and meets a designated requirement; verifying whether the appointed configured IP address is an agent IP address meeting the appointed requirement; and if so, sending a data acquisition request to the FPRS according to the appointed configured IP address. The method and the system realize the IP address proxy based on the VPS service, and perform data acquisition safely and with high quality through the proxy IP address.
Next, the IP address proxy method in the present exemplary embodiment will be further explained.
in step S110, a designated configured IP address may be obtained through the VPS service, where the designated configured IP address is an agent IP address that meets a designated requirement and is allocated according to a preset address identifier to be configured.
The preset address identifier to be configured may be an identifier used for allocating an IP address of a specified city, for example, a city name, or a code representing a certain city, and if there is no requirement for the city of the IP address, the address identifier to be configured may be a default identifier, and the allocated city may be a randomly allocated city, or a preset default city. The preset identifier of the address to be configured may also be an identifier indicating to allocate a civil IP address, and when the IP address to be configured is obtained from the VPS service, the civil IP address may be allocated according to the identifier of the address to be configured. The IP address of the specified configuration is an IP address indicating that the configuration is required to be a civil IP.
in step S120, it may be checked whether the specified configured IP address is a proxy IP address that satisfies the specified requirements.
in order to implement secure data transmission through a designated configured IP address, in an exemplary embodiment of the present disclosure, intranet penetration may be performed through a FPR (Fast Reverse Proxy, high-speed Reverse Proxy), a FPRC (Fast Reverse Proxy Client, high-speed Reverse Proxy Client) is configured on a VPS (virtual private Server ) device, and a FPRs (Fast Reverse Proxy Server, high-speed Reverse Proxy Server) is configured on a local device, so as to complete access and acquisition of data on the intranet. Specifically, after the FPRC is configured in the VPS, an IP address which is appointed to be configured is obtained through the VPS service, the IP address is configured into an appointed home city, and the appointed home city is sent to the local through the FPRC; meanwhile, the FPRS is configured in the local, and the IP address of the designated configuration sent by the VPS through the FPRC is received, so that the designated configuration of the IP address is completed. In the embodiment of the present example, taking the local IP address as 202.96.45.81 as an example, the IP address is identified as an operator IP address, and if the crawler of the website to be obtained data is crawled directly by using the IP address, the website may be intercepted from accessing due to the enablement of the anti-crawler IP address interception function of the website. Therefore, through the VPS service, the IP address of 202.96.45.81 is redialed to be designated as the civil IP address of Beijing City, and the data is returned by accessing the IP address detection website, so that the accessed civil IP address is 202.106.126.92 (Beijing City), and at the moment, the function of crawling data by a normal crawler of the website can be realized through the VPS.
in the embodiment of the present example, verifying whether the IP address specified for configuration is a proxy IP address satisfying specified requirements includes: sending an IP address verification message to an IP address verification service through the appointed configured IP address; receiving a verification response message returned by the IP address verification service, wherein the verification response message comprises an IP address to be verified and address information to be verified; matching the IP address to be verified in a preset IP address verification library, checking the IP address to be verified and the information of the address to be verified, and checking whether the IP address to be verified and the information of the address to be verified are consistent with the IP address which is stored in the IP address verification library and is assigned last item and the corresponding address identifier; if the IP addresses are not consistent but the to-be-verified address information is consistent with the address identification, determining that the appointed configured IP address is an agent IP address meeting the appointed requirement, indicating that the IP address is successfully switched, and storing the agent IP address and the corresponding address identification into a preset IP address verification library; if the IP addresses are consistent, the appointed configured IP address is determined to be the proxy IP address which does not meet the appointed requirement, and the IP address switching failure is indicated.
specifically, the IP address verification service may be a verification website such as IP138.com, ip.cn, and the like, and sends an IP address verification message for verifying whether the IP address is successfully switched to the IP address verification service to obtain a verification response message returned by the IP address verification service and having the to-be-verified IP address and the to-be-verified address information, where the to-be-verified IP address is an IP address of a sender of the IP address verification message, and the to-be-verified address information may include address information of the to-be-verified IP address, and the address information is used to represent a city where the IP address is located.
After receiving the IP address to be verified and the information of the IP address to be verified, matching the IP address to be verified with a preset IP address verification library, wherein the preset IP address verification library stores a switched proxy IP address which is successfully switched, and the IP address allocated by the VPS service is changed once after dialing each time, so that in order to ensure that the allocated appointed configured IP address is the proxy IP address which is successfully switched, the IP address to be verified and the last item stored in the IP address verification library can be matched, and whether the IP address to be verified is consistent with the last item stored in the IP address verification library is judged, if so, the IP address switching is failed, the current IP address is still the IP address allocated last time, namely the IP address before switching stored in the preset IP address verification library; if the address information to be verified is inconsistent with the address identifier when the IP address is requested to be configured, whether the address information to be verified is consistent with the address identifier when the IP address is requested to be configured or not can be further judged, and if the IP address to be verified is inconsistent with the last item stored in the IP address verification library and/or the address information to be verified is consistent with the address identifier when the IP address is requested to be configured, the IP address can be successfully switched to the proxy IP address.
After the IP address is successfully switched to the proxy IP address, the proxy IP address and the corresponding address identifier can be stored in a preset IP address check library so as to update the IP address check library, and the proxy IP address is backed up and is convenient to use in the next switching check.
If the IP address switching fails, an overtime detection timer can be started; and after the timeout duration set by the timeout detection timer is reached, executing a step of verifying whether the IP address specified and configured is the proxy IP address meeting the specified requirement, and when the IP address specified and configured is still not the proxy IP address meeting the specified requirement, indicating that the VPS service has a fault, and sending alarm information to inform an administrator to check and repair in time.
for example, when the normal crawler crawling data function of the website is locally realized through the IP address 202.96.45.81 in beijing city, the IP address 202.96.45.81 in beijing city is stored in the IP address check library, and the IP address, the service identifier and the corresponding address identifier which are configured in a designated manner are configured correspondingly. When the local needs to be accessed through the VPS again, the IP address of a new Beijing city is allocated again through the VPS redialing: 202.96.62.11, after detecting the website by IP address detection, comparing with the last successfully used IP address 202.96.45.81 stored in the IP address check library, finding out that the IP address is not consistent, but the address information to be checked is consistent with the designated address identification, judging that the IP address conversion of VPS service distribution is successful, crawling the website by the crawler through 202.96.62.11, and updating 202.96.62.11 address and storing in the IP address check library for the next call and check.
In step S130, if the IP address of the designated configuration is an agent IP address that meets the designated requirement, a data acquisition request may be sent to the FPRS device according to the IP address of the designated configuration.
in the embodiment of the present example, to further ensure the data transmission security and avoid the data acquisition request from being intercepted, when the data acquisition request is sent to the FPRS device according to the IP address, the data acquisition request may be transmitted through a preset encryption protocol, for example, through an encryption algorithm such as a TLS protocol. And, a message size threshold value can be preset, when data in the data acquisition request is too large, in order to judge whether the message size of the data acquisition request is larger than or equal to the preset message size, if so, the data acquisition request is compressed, so that the network flow between the FPRC and the FPRS is effectively reduced, and the flow forwarding speed is accelerated.
Specifically, when the FPRC sends a data acquisition request through the FPRS, the communication content between the FPRC and the FPRS may be transmitted in an encrypted manner by setting uSe _ enCryption ═ true in the file, so as to effectively prevent the traffic from being intercepted. When the size of the message of the data acquisition request is judged to be larger than or equal to the preset message size threshold, the length of the transmitted message is longer, the transmission content can be compressed by setting uSe _ compact ═ true, the network flow between the FPRC and the FPRS can be effectively reduced, and the flow forwarding speed is accelerated.
in this exemplary embodiment, an IP address proxy method is further provided, where the IP address proxy method is applied to an FPRS device, and as shown in fig. 2, the IP address proxy method may include:
in step S210, a data request message sent by the FPRC device may be received to obtain a device identifier of the data request message and an IP address assigned to the data request message, where the IP address assigned to the data request message is an agent IP address that meets an assigned requirement and is assigned according to a preset address identifier to be configured.
The preset address identifier to be configured may be an identifier used for allocating an IP address of a specified city, for example, a city name, or a code representing a certain city, and if there is no requirement for the city of the IP address, the address identifier to be configured may be a default identifier, and the allocated city may be a randomly allocated city, or a preset default city. The preset identifier of the address to be configured may also be an identifier indicating to allocate a civil IP address, and when the IP address to be configured is obtained from the VPS service, the allocation of the civil IP address may be determined according to the identifier of the address to be configured. The IP address of the specified configuration is an IP address configured as a civil IP.
In this exemplary embodiment, after receiving a data request packet sent by an FPRC, an FPRS obtains a device identifier of the data request packet and an IP address assigned to the FPRS, where the IP address assigned to the FPRS is an agent IP address that is assigned according to a preset address identifier to be configured and meets an assigned requirement, and since the FPRC associates a local device Client with a VPS service, the device identifier is a VPS service identifier, and for example, when starting multiple VPS services, the VPS service identifier may be a VPS1 or a VPS2 …
In order to realize secure data transmission through a designated configured IP address, in the exemplary embodiment of the present disclosure, intranet penetration may be performed through a high-performance reverse proxy application FPR, FPRCs are configured on a virtual private server VPS device, and FPRSs are configured on a local device, so as to complete access and acquisition of external network data. Specifically, after the FPRC is configured in the VPS service, an IP address which is configured in a designated mode is obtained through the VPS service, the IP address is configured into a designated home city, and the home city is sent to the local through the FPRC; meanwhile, the FPRS is configured in the local, and the IP address of the designated configuration sent by the VPS through the FPRC is received, so that the designated configuration of the IP address is completed.
in step S220, it may be determined that the interface corresponding to the device identifier adds the corresponding relationship between the interface and the device identifier and the IP address configured in the preset interface table entry, and sends the data request packet.
In an exemplary embodiment of the present disclosure, the preset interface table entry may be as shown in table 1:
TABLE 1
Table 1 shows preset interface entries, which are merely examples for further understanding of the present invention and are not intended to limit the specific contents of the preset interface entries in the present disclosure.
in the embodiment of the present invention, to further ensure data transmission security and avoid intercepting a data acquisition request, when the FPRS device sends the data acquisition request to the website to be accessed, the FPRS device may directly send the encrypted and compressed data acquisition request to a destination address, or may transmit the data acquisition request through a preset encryption protocol, for example, an encryption algorithm such as a TLS protocol, and further, when it is determined that the data acquisition request is too large, the data acquisition request may be compressed, so that network traffic is effectively reduced, and traffic forwarding speed is increased.
specifically, when the FPRS device sends a data acquisition request, the communication content between the FPRC and the FPRS may also be transmitted in an encrypted manner by setting uSe _ enCryption ═ true in the file, so as to effectively prevent the traffic from being intercepted. When the size of the message of the data acquisition request is judged to be greater than or equal to the preset message size threshold, it is indicated that the length of the transmitted message is long, and the transmission content can be compressed by setting uSe _ compact ═ true, so that the network traffic is reduced, and the traffic forwarding speed is accelerated.
in step S230, the data response packet may be received to obtain a destination IP address of the data response packet, an interface corresponding to the destination IP address is searched according to a preset interface table entry, and the data response packet is sent to the corresponding FPRC device through the interface corresponding to the destination IP address.
after receiving the data response message, the destination IP address of the data response message is acquired, the corresponding interface information is searched in table 1 through the destination IP address, and the data response message is sent to the corresponding VPS service device through the corresponding interface information.
It should be noted that although the various steps of the methods of the present disclosure are depicted in the drawings in a particular order, this does not require or imply that these steps must be performed in this particular order, or that all of the depicted steps must be performed, to achieve desirable results. Additionally or alternatively, certain steps may be omitted, multiple steps combined into one step execution, and/or one step broken down into multiple step executions, etc.
In addition, in the present exemplary embodiment, an IP address proxy apparatus is also provided. Referring to fig. 3, the IP address proxy apparatus 300 may include: an IP address obtaining module 310, an IP address verifying module 320, and a data obtaining request sending module 330. Wherein:
an IP address obtaining module 310, configured to obtain, through a VPS service, an IP address of a designated configuration, where the IP address of the designated configuration is an agent IP address that meets a designated requirement and is allocated according to a preset address identifier to be configured;
The IP address checking module 320 is configured to check whether the IP address of the designated configuration is an agent IP address that meets a designated requirement;
a data obtaining request sending module 330, configured to send a data obtaining request to the FPRS device according to the IP address configured in the specification.
In the present exemplary embodiment, an IP address proxy apparatus is also provided. Referring to fig. 4, the IP address proxy apparatus 400 may include: a data acquisition request receiving module 410, a data request message sending module 420 and a data response message receiving module 430. Wherein:
a data obtaining request receiving module 410, configured to receive a data request packet sent by an FPRC device, and obtain a device identifier of the data request packet and an IP address of a specific configuration, where the IP address of the specific configuration is an agent IP address that meets a specific requirement and is allocated according to a preset address identifier to be configured;
A data request message sending module 420, configured to determine an interface corresponding to the device identifier, add a correspondence between the interface and the device identifier and an IP address configured in an appointed manner to a preset interface table entry, and send the data request message;
And a data response message receiving module 430, configured to receive a data response message, acquire a destination IP address of the data response message, search for an interface corresponding to the destination IP address according to the preset interface table entry, and send the data response message to a corresponding FPRC device through the interface corresponding to the destination IP address.
the specific details of each IP address proxy device module are already described in detail in the corresponding IP address proxy method, and therefore are not described herein again.
it should be noted that although several modules or units of the IP address proxy apparatus 300, 400 are mentioned in the above detailed description, such division is not mandatory. Indeed, the features and functionality of two or more modules or units described above may be embodied in one module or unit, according to embodiments of the present disclosure. Conversely, the features and functions of one module or unit described above may be further divided into embodiments by a plurality of modules or units.
in addition, in an exemplary embodiment of the present disclosure, an electronic device capable of implementing the above method is also provided.
As will be appreciated by one skilled in the art, aspects of the present invention may be embodied as a system, method or program product. Thus, various aspects of the invention may be embodied in the form of: an entirely hardware embodiment, an entirely software embodiment (including firmware, microcode, etc.) or an embodiment combining hardware and software aspects that may all generally be referred to herein as a "circuit," module "or" system.
an electronic device 500 according to such an embodiment of the invention is described below with reference to fig. 5. The electronic device 500 shown in fig. 5 is only an example and should not bring any limitation to the functions and the scope of use of the embodiments of the present invention.
As shown in fig. 5, the electronic device 500 is embodied in the form of a general purpose computing device. The components of the electronic device 500 may include, but are not limited to: the at least one processing unit 510, the at least one memory unit 520, a bus 530 connecting various system components (including the memory unit 520 and the processing unit 510), and a display unit 540.
Wherein the storage unit stores program code that is executable by the processing unit 510 to cause the processing unit 510 to perform steps according to various exemplary embodiments of the present invention as described in the above section "exemplary methods" of the present specification. For example, the processing unit 510 may perform steps S110 to S130 as shown in fig. 1.
the memory unit 520 may include a readable medium in the form of a volatile memory unit, such as a random access memory unit (RAM)5201 and/or a cache memory unit 5202, and may further include a read only memory unit (ROM) 5203.
Storage unit 520 may also include a program/utility 5204 having a set (at least one) of program modules 5205, such program modules 5205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 530 may be one or more of any of several types of bus structures including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
the electronic device 500 may also communicate with one or more external devices 570 (e.g., keyboard, pointing device, Bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 500, and/or with any devices (e.g., router, modem, etc.) that enable the electronic device 500 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 550. Also, the electronic device 500 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network, such as the internet) via the network adapter 560. As shown, the network adapter 560 communicates with the other modules of the electronic device 500 over the bus 530. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 500, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
in an exemplary embodiment of the present disclosure, there is also provided a computer-readable storage medium having stored thereon a program product capable of implementing the above-described method of the present specification. In some possible embodiments, aspects of the invention may also be implemented in the form of a program product comprising program code means for causing a terminal device to carry out the steps according to various exemplary embodiments of the invention described in the above-mentioned "exemplary methods" section of the present description, when said program product is run on the terminal device.
Referring to fig. 6, a program product 600 for implementing the above method according to an embodiment of the present invention is described, which may employ a portable compact disc read only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited in this regard and, in the present document, a readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
The program product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
a computer readable signal medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable signal medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
Furthermore, the above-described figures are merely schematic illustrations of processes involved in methods according to exemplary embodiments of the invention, and are not intended to be limiting. It will be readily understood that the processes shown in the above figures are not intended to indicate or limit the chronological order of the processes. In addition, it is also readily understood that these processes may be performed synchronously or asynchronously, e.g., in multiple modules.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
it will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is to be limited only by the terms of the appended claims.

Claims (10)

1. an IP address proxy method is applied to a high-speed reverse proxy client FPRC device, and comprises the following steps:
Acquiring an IP address of appointed configuration through VPS service, wherein the IP address of the appointed configuration is an agent IP address which is distributed according to a preset address identifier to be configured and meets the appointed requirement;
Verifying whether the appointed configured IP address is an agent IP address meeting the appointed requirement;
And if so, sending a data acquisition request to the FPRS equipment according to the proxy IP address.
2. The method of claim 1, wherein verifying whether the IP address of the specified configuration is a proxy IP address that meets specified requirements comprises:
Sending an IP address verification message to an IP address verification service through the appointed configured IP address;
Receiving a verification response message replied by the IP address verification service, wherein the verification response message comprises an IP address to be verified and address information to be verified;
matching the IP address to be verified in a preset IP address verification library, and checking whether the IP address to be verified is consistent with the last appointed configured IP address stored in the IP address verification library;
If the IP address to be checked is inconsistent with the last appointed IP address stored in the IP address checking library, further judging whether the address information to be checked is consistent with the address identifier to be configured, if the IP address is inconsistent and the address information to be checked is consistent with the address identifier to be configured, determining that the appointed IP address is an agent IP address meeting the appointed requirement, indicating that the IP address is successfully switched, and storing the agent IP address and the corresponding address identifier into a preset IP address checking library;
and if the IP address to be verified is consistent with the last appointed IP address stored in the IP address verification library, determining that the appointed IP address is an agent IP address which does not meet the appointed requirement, and indicating that the IP address switching fails.
3. the method of claim 2, wherein the method comprises:
If the IP address switching fails, starting an overtime detection timer;
And after the overtime duration set by the overtime detection timer is reached, the step of verifying whether the appointed configured IP address is the proxy IP address meeting the appointed requirement is executed, and if not, alarm information is sent.
4. the method of claim 1, wherein sending a data acquisition request to the FPRS device based on the proxy IP address comprises:
And transmitting the data acquisition request through a preset encryption protocol, wherein the preset encryption protocol comprises a TLS protocol.
5. the method of claim 1, wherein sending a data acquisition request to the FPRS device based on the proxy IP address comprises:
And judging whether the message size of the data acquisition request is larger than or equal to the preset message size, if so, compressing the data acquisition request.
6. An IP proxy method is applied to a high-speed reverse proxy server (FPRS) device, and comprises the following steps:
receiving a data request message sent by FPRC equipment, and acquiring an equipment identifier of the data request message and an IP address of specified configuration, wherein the IP address of the specified configuration is an agent IP address which is distributed according to a preset address identifier to be configured and meets specified requirements;
Determining an interface corresponding to the equipment identifier, adding the corresponding relation between the interface and the equipment identifier and the IP address configured in an appointed mode into a preset interface table entry, and sending the data request message;
receiving a data response message, acquiring a target IP address of the data response message, searching an interface corresponding to the target IP address according to the preset interface table entry, and sending the data response message to the corresponding FPRC equipment through the interface corresponding to the target IP address.
7. an IP address proxy apparatus, the apparatus comprising:
The IP address acquisition module is used for acquiring an appointed configured IP address through VPS service, wherein the appointed configured IP address is an agent IP address which is distributed according to a preset address identifier to be configured and meets an appointed requirement;
the IP address checking module is used for checking whether the appointed configured IP address is an agent IP address meeting the appointed requirement;
And the data acquisition request sending module is used for sending a data acquisition request to the FPRS equipment according to the appointed configured IP address.
8. An IP address proxy apparatus, the apparatus comprising:
The data acquisition request receiving module is used for receiving a data request message sent by the FPRC equipment, and acquiring an equipment identifier of the data request message and an appointed configured IP address, wherein the appointed configured IP address is an agent IP address which is distributed according to a preset address identifier to be configured and meets an appointed requirement;
A data request message sending module, configured to determine an interface corresponding to the device identifier, add a correspondence between the interface and the device identifier and an IP address assigned to the device identifier to a preset interface table entry, and send the data request message;
and the data response message receiving module is used for receiving a data response message, acquiring a target IP address of the data response message, searching an interface corresponding to the target IP address according to the preset interface table entry, and sending the data response message to the corresponding FPRC equipment through the interface corresponding to the target IP address.
9. An IP address proxy apparatus, comprising:
Memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the IP address proxy method according to any of claims 1-6 when executing the program.
10. a computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, implements the IP address proxy method according to any one of claims 1 to 6.
CN201910773505.4A 2019-08-21 2019-08-21 IP address proxy method and device Active CN110572375B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910773505.4A CN110572375B (en) 2019-08-21 2019-08-21 IP address proxy method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910773505.4A CN110572375B (en) 2019-08-21 2019-08-21 IP address proxy method and device

Publications (2)

Publication Number Publication Date
CN110572375A true CN110572375A (en) 2019-12-13
CN110572375B CN110572375B (en) 2021-08-17

Family

ID=68774189

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910773505.4A Active CN110572375B (en) 2019-08-21 2019-08-21 IP address proxy method and device

Country Status (1)

Country Link
CN (1) CN110572375B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114125071A (en) * 2021-11-23 2022-03-01 北京人大金仓信息技术股份有限公司 Data compression transmission method and device

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040107214A1 (en) * 2002-11-29 2004-06-03 Hung Lup Cheong Patrick Customized document portfolio system integrating IP libraries and technology documents
CN103023926A (en) * 2012-12-28 2013-04-03 中科正阳信息安全技术有限公司 Reverse proxy based information leakage preventing security gateway system
US8675661B1 (en) * 2009-05-07 2014-03-18 Sprint Communications Company L.P. Allocating IP version fields to increase address space
CN104378455A (en) * 2014-11-13 2015-02-25 杭州华三通信技术有限公司 IP address distribution method and device
CN106453693A (en) * 2016-12-14 2017-02-22 深圳Tcl数字技术有限公司 IP address allocation method and apparatus
CN107770171A (en) * 2017-10-18 2018-03-06 厦门集微科技有限公司 The verification method and system of the anti-reptile of server
WO2019005935A1 (en) * 2017-06-27 2019-01-03 Cisco Technology, Inc. Ethernet virtual private network using segment routing
CN109474710A (en) * 2018-10-30 2019-03-15 北京网众共创科技有限公司 Obtain the method and device of information
CN110034979A (en) * 2019-04-23 2019-07-19 恒安嘉新(北京)科技股份公司 A kind of proxy resources monitoring method, device, electronic equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20040107214A1 (en) * 2002-11-29 2004-06-03 Hung Lup Cheong Patrick Customized document portfolio system integrating IP libraries and technology documents
US8675661B1 (en) * 2009-05-07 2014-03-18 Sprint Communications Company L.P. Allocating IP version fields to increase address space
CN103023926A (en) * 2012-12-28 2013-04-03 中科正阳信息安全技术有限公司 Reverse proxy based information leakage preventing security gateway system
CN104378455A (en) * 2014-11-13 2015-02-25 杭州华三通信技术有限公司 IP address distribution method and device
CN106453693A (en) * 2016-12-14 2017-02-22 深圳Tcl数字技术有限公司 IP address allocation method and apparatus
WO2019005935A1 (en) * 2017-06-27 2019-01-03 Cisco Technology, Inc. Ethernet virtual private network using segment routing
CN107770171A (en) * 2017-10-18 2018-03-06 厦门集微科技有限公司 The verification method and system of the anti-reptile of server
CN109474710A (en) * 2018-10-30 2019-03-15 北京网众共创科技有限公司 Obtain the method and device of information
CN110034979A (en) * 2019-04-23 2019-07-19 恒安嘉新(北京)科技股份公司 A kind of proxy resources monitoring method, device, electronic equipment and storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114125071A (en) * 2021-11-23 2022-03-01 北京人大金仓信息技术股份有限公司 Data compression transmission method and device
CN114125071B (en) * 2021-11-23 2024-02-09 北京人大金仓信息技术股份有限公司 Data compression transmission method and device

Also Published As

Publication number Publication date
CN110572375B (en) 2021-08-17

Similar Documents

Publication Publication Date Title
CN111314452B (en) Shell access method, device, equipment and storage medium of cloud mobile phone
CN107635027B (en) Domain name resolution method, medium, device and computing equipment
US9253129B2 (en) Instant messaging with browser collaboration
US9973513B2 (en) Method and apparatus for communication number update
CN109474600B (en) Account binding method, system, device and equipment
US20220022036A1 (en) Security verification method and system, computer device and medium
CN103581351A (en) Method and device for having access to network
CN112291384B (en) Information processing method for domain name resolution and electronic equipment
CN110677475A (en) Micro-service processing method, device, equipment and storage medium
CN111241523B (en) Authentication processing method, device, equipment and storage medium
CN113992382B (en) Service data processing method and device, electronic equipment and storage medium
CN110572375B (en) IP address proxy method and device
CN113923008B (en) Malicious website interception method, device, equipment and storage medium
CN115190062A (en) Service processing method and device, electronic equipment and computer readable storage medium
CN108595574B (en) Database cluster connection method, device, equipment and storage medium
CN111885190B (en) Service request processing method and system
EP3525411B1 (en) Terminal authentication method and device
CN113553557A (en) Application secret-free login method and device, electronic equipment and storage medium
CN110191203B (en) Method for realizing dynamic access of server and electronic equipment
US11411887B2 (en) Method and device for performing traffic control on user equipment
CN107770203B (en) Service request forwarding method, device and system
CN114980262A (en) Access gateway selection method and device, storage medium and electronic equipment
CN104346228A (en) Application program sharing method and terminal
JP2017528091A (en) Communication link transmission method, apparatus and terminal
CN110830513A (en) Cloud engine, method for remotely accessing application, system thereof and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant