CN111818002A - Internet interaction system based on web information technology - Google Patents

Internet interaction system based on web information technology Download PDF

Info

Publication number
CN111818002A
CN111818002A CN201910294108.9A CN201910294108A CN111818002A CN 111818002 A CN111818002 A CN 111818002A CN 201910294108 A CN201910294108 A CN 201910294108A CN 111818002 A CN111818002 A CN 111818002A
Authority
CN
China
Prior art keywords
data
interaction
user
information
web
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910294108.9A
Other languages
Chinese (zh)
Inventor
李忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Zeli Technology Co ltd
Original Assignee
Hangzhou Zeli Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Zeli Technology Co ltd filed Critical Hangzhou Zeli Technology Co ltd
Priority to CN201910294108.9A priority Critical patent/CN111818002A/en
Publication of CN111818002A publication Critical patent/CN111818002A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1408Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic by monitoring network traffic
    • H04L63/1425Traffic logging, e.g. anomaly detection
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/686Types of network addresses using dual-stack hosts, e.g. in Internet protocol version 4 [IPv4]/Internet protocol version 6 [IPv6] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L65/00Network arrangements, protocols or services for supporting real-time applications in data packet communication
    • H04L65/1066Session management
    • H04L65/1101Session protocols
    • H04L65/1104Session initiation protocol [SIP]

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the technical field of information technology, in particular to an internet interaction system based on web information technology, which comprises a web server, an encryption system, a gateway conversion and interaction system, wherein the interaction system is used for acquiring and transmitting information for user interaction and converting an interaction instruction of a user into a digital signal; the web server treats the data submitted by all users as untrusted data, and processes the untrusted data in different ways so as to reduce the security risk of the web system; the node supporting the dual-protocol stack can communicate with the node supporting the IPv4 protocol and the node supporting the IPv6 protocol, the interactive system realizes platform interaction, and the system has high safety, high transmission efficiency, strong interactivity and strong practicability.

Description

Internet interaction system based on web information technology
Technical Field
The invention relates to the technical field of information technology, in particular to an internet interaction system based on web information technology.
Background
Information Technology (abbreviated IT) is a generic term of various technologies mainly used for managing and processing Information. It mainly applies computer science and communication technology to design, develop, install and implement information system and application software. It is also commonly referred to as Information and Communications Technology (ICT). The system mainly comprises a sensing technology, a computer and intelligent technology, a communication technology and a control technology.
Research on information technology includes science, technology, engineering, and management disciplines, applications of these disciplines in the management, transmission, and processing of information, related software and devices, and their interactions.
Applications of information technology include computer hardware and software, network and communication technology, application software development tools, and the like. Computers and the internet have become widespread, and it is becoming increasingly common to use computers to produce, process, exchange and distribute various forms of information (e.g., books, business documents, newspapers, records, movies, television programs, voice, graphics, images, etc.).
With the development and progress of the society, information technology becomes more important, especially web network information technology, and the internet interaction system based on the web information technology is provided with high safety, high transmission efficiency and strong interactivity aiming at the interaction layer of the internet.
Disclosure of Invention
Aiming at the defects of the prior art, the invention discloses an internet interaction system based on a web information technology, which is used for solving the problem of how to provide the internet interaction system with high safety, high transmission efficiency and strong interactivity.
The invention is realized by the following technical scheme:
the internet interaction system based on the web information technology is characterized by comprising a web server, an encryption system, a gateway conversion system and an interaction system, wherein the interaction system is used for acquiring and transmitting information for user interaction and converting an interaction instruction of a user into a digital signal, the interaction system transmits the digital signal to the encryption system through the gateway conversion, the encryption system encrypts the digital signal through encryption setting, and the encrypted digital signal is transmitted to the web server after being decrypted to realize platform interaction and information transmission.
Preferably, in the web server, when the network transmission data shows an abnormal state, a hacker steals a large amount of data of the system and generates data traffic, and the web system analyzes the system data, finds intrusion time and source, knows the content of the stolen information, and detects whether other server facilities and the operated system are safe.
Preferably, in the web server, when the network transmission data shows an abnormality, the web server further needs to monitor the abnormal login or malicious login in real time, store the login history in a database, and collect and analyze relevant data after finding a problem, wherein the login monitoring is composed of a user name, an IP address, login time and logout time.
Preferably, the data layer of the web server encodes or filters all the untrusted data submitted by the user, or fills useless data in the untrusted data submitted by the user, limits the data length for some key inputs, or deletes existing problem characters, so that a potential malicious script in the untrusted data cannot be executed, and the untrusted data is purified.
Preferably, the interactive system comprises a login and registration subsystem, a call function subsystem, a network information subsystem, a user information subsystem and a geographic position subsystem.
Preferably, the login and registration subsystem is used for user login, registration and password retrieval service;
the conversation function subsystem registers the conversation function of the SIP and processes the relevant information of the SIP;
the network information subsystem provides a network interface for the user information management of the upper layer and also provides support for the geographical position management of the lower layer;
the user information subsystem manages user information of the software;
the geographic location subsystem manages the geographic location of the user.
Preferably, the gateway conversion work includes the following steps:
s1 if the destination address used by the application program is IPv4 address, then the protocol stack IPv4 is used;
s2, if the destination address used by the application program is IPv6 compatible with IPv4, and IPv6 is packaged in IPv4, the IPv4 protocol is also used;
s3 if the destination address used by the application program is non-IPv 4 compatible IPv6 address, using IPv6 protocol or encapsulating in a tunnel with default configuration;
s4, if the destination address of the application is a domain name, first obtain the corresponding IP address from the DNS server, and then perform corresponding processing according to the address situation.
The invention has the beneficial effects that:
the web server treats the data submitted by all users as untrusted data, and processes the untrusted data in different ways so as to reduce the security risk of the web system; the node supporting the dual-protocol stack can communicate with the node supporting the IPv4 protocol and the node supporting the IPv6 protocol, the communication efficiency is high, the interactive system realizes platform interaction, and the method is high in safety, transmission efficiency and interactivity and has strong practicability.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a block diagram of the overall architecture of the present invention;
fig. 2 is a schematic diagram of a gateway conversion operation according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
The embodiment discloses an internet interaction system based on a web information technology, which comprises a web server, an encryption system, a gateway conversion and interaction system, wherein the interaction system is used for acquiring and transmitting information for user interaction and converting an interaction instruction of a user into a digital signal, the interaction system transmits the digital signal to the encryption system through the gateway conversion, the encryption system encrypts the digital signal through encryption setting, and the encrypted digital signal is transmitted to the web server after being decrypted to realize platform interaction and information transmission.
In the web server, when the network transmission data is displayed abnormally, a hacker steals a large amount of data of the system and generates data traffic, the web system analyzes the system data, searches the intrusion time and source, knows the content of the stolen information, and detects whether other server facilities and the operated system are safe.
In the web server, when the network transmission data is displayed abnormally, abnormal login or malicious login needs to be monitored in real time, the login history is stored in a database, and after a problem is found, relevant data is collected and analyzed, wherein the login monitoring is composed of a user name, an IP address, login time and logout time.
The data layer of the web server encodes or filters all the untrusted data submitted by the user, or fills useless data in the untrusted data submitted by the user, limits the data length for some key inputs, or deletes existing problem characters, so that potential malicious scripts in the untrusted data cannot be executed, and the untrusted data is purified.
The interactive system comprises a login registration subsystem, a call function subsystem, a network information subsystem, a user information subsystem and a geographic position subsystem.
The login and registration subsystem is used for user login, registration and password retrieval service;
the conversation function subsystem registers the conversation function of the SIP and processes the relevant information of the SIP;
the network information subsystem provides a network interface for the user information management of the upper layer and also provides support for the geographical position management of the lower layer;
the user information subsystem manages the user information of the software;
the geographic location subsystem manages the geographic location of the user.
The web server of the embodiment treats the data submitted by all users as untrusted data, and processes the untrusted data in different ways, so as to reduce the security risk of the web system.
Example 2
The embodiment discloses that the gateway conversion work shown in fig. 2 includes the following steps:
s1 if the destination address used by the application program is IPv4 address, then the protocol stack IPv4 is used;
s2, if the destination address used by the application program is IPv6 compatible with IPv4, and IPv6 is packaged in IPv4, the IPv4 protocol is also used;
s3 if the destination address used by the application program is non-IPv 4 compatible IPv6 address, using IPv6 protocol or encapsulating in a tunnel with default configuration;
s4, if the destination address of the application is a domain name, first obtain the corresponding IP address from the DNS server, and then perform corresponding processing according to the address situation.
The gateway translation of the present embodiment supports both IPv4 and IPv6 protocol stacks at a single node. Since IPv6 and IPv4 are network layer protocols with similar functions, both based on the same physical platform, and there is no difference between the transport layer protocols TCP and UDP loaded thereon, a node supporting the dual protocol stack can communicate with both a node supporting the IPv4 protocol and a node supporting the IPv6 protocol.
The dual stack technology is also the foundation of transition technologies such as tunnel, NAT-PT, etc. Only devices with dual protocol stacks can interwork with both IPv4 networks and IPv6 networks, with the difference that technologies such as tunneling, NAT-PT, etc. provide replacement of one protocol stack for another, i.e. traffic of one protocol is converted or encapsulated into another, while dual protocol stack networks can only provide basic forwarding of IPv4 traffic to IPv4 traffic, or IPv6 traffic to IPv6 traffic.
The gateway of the embodiment converts the node supporting the dual-protocol stack, which can communicate with the node supporting the IPv4 protocol and the node supporting the IPv6 protocol, so that the communication efficiency is high, the interactive system realizes platform interaction, and the gateway has high security, high transmission efficiency, strong interactivity and strong practicability.
The above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (7)

1. The internet interaction system based on the web information technology is characterized by comprising a web server, an encryption system, a gateway conversion system and an interaction system, wherein the interaction system is used for acquiring and transmitting information for user interaction and converting an interaction instruction of a user into a digital signal, the interaction system transmits the digital signal to the encryption system through the gateway conversion, the encryption system encrypts the digital signal through encryption setting, and the encrypted digital signal is transmitted to the web server after being decrypted to realize platform interaction and information transmission.
2. The internet interactive system based on the web information technology as claimed in claim 1, wherein in the web server, when the network transmission data is displayed abnormally, a hacker steals a large amount of data of the system and generates data traffic, and the web system analyzes the system data, finds intrusion time and source, knows the content of the stealed information, and detects whether other server facilities and the operated system are safe.
3. The system of claim 2, wherein the web server further monitors abnormal log-in or malicious log-in real time when the network transmission data shows abnormality, stores log-in history in the database, and collects and analyzes relevant data after finding problems, and the log-in monitoring includes user name, IP address, log-in and log-out time.
4. The internet interaction system based on the web information technology as claimed in claim 1, wherein the data layer of the web server encodes or filters all the untrusted data submitted by the user, or fills in useless data for the untrusted data submitted by the user, performs data length limitation for some key inputs, or deletes existing problem characters, so that potential malicious scripts in the untrusted data cannot be executed, and the untrusted data is purified.
5. A web information technology based internet interaction system as claimed in claim 1, wherein the interaction system comprises a login registration subsystem, a call function subsystem, a network information subsystem, a user information subsystem and a geographical location subsystem.
6. The internet interaction system based on web information technology as claimed in claim 5, wherein the login registration subsystem is used for user login, registration and password retrieval service;
the conversation function subsystem registers the conversation function of the SIP and processes the relevant information of the SIP;
the network information subsystem provides a network interface for the user information management of the upper layer and also provides support for the geographical position management of the lower layer;
the user information subsystem manages user information of the software;
the geographic location subsystem manages the geographic location of the user.
7. The internet interactive system based on web information technology as claimed in claim 1, wherein the gateway converting work comprises the steps of:
s1 if the destination address used by the application program is IPv4 address, then the protocol stack IPv4 is used;
s2, if the destination address used by the application program is IPv6 compatible with IPv4, and IPv6 is packaged in IPv4, the IPv4 protocol is also used;
s3 if the destination address used by the application program is non-IPv 4 compatible IPv6 address, using IPv6 protocol or encapsulating in a tunnel with default configuration;
s4, if the destination address of the application is a domain name, first obtain the corresponding IP address from the DNS server, and then perform corresponding processing according to the address situation.
CN201910294108.9A 2019-04-12 2019-04-12 Internet interaction system based on web information technology Pending CN111818002A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910294108.9A CN111818002A (en) 2019-04-12 2019-04-12 Internet interaction system based on web information technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910294108.9A CN111818002A (en) 2019-04-12 2019-04-12 Internet interaction system based on web information technology

Publications (1)

Publication Number Publication Date
CN111818002A true CN111818002A (en) 2020-10-23

Family

ID=72843898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910294108.9A Pending CN111818002A (en) 2019-04-12 2019-04-12 Internet interaction system based on web information technology

Country Status (1)

Country Link
CN (1) CN111818002A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106487579A (en) * 2015-08-31 2017-03-08 西门子公司 For providing method and the webserver part of access equipment configuration data
CN106790759A (en) * 2016-12-29 2017-05-31 赛尔网络有限公司 IPv4/IPv6 converting systems and method based on SDN
US20170302622A1 (en) * 2011-07-29 2017-10-19 Fortinet, Inc. Directing clients based on communication format
US20180167359A1 (en) * 2014-08-04 2018-06-14 Fortinet, Inc. Dns-enabled communication between heterogeneous devices
CN109451097A (en) * 2019-01-02 2019-03-08 北京宏图佳都通信设备有限公司 IPv4/IPv6 address conversion system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170302622A1 (en) * 2011-07-29 2017-10-19 Fortinet, Inc. Directing clients based on communication format
US20180167359A1 (en) * 2014-08-04 2018-06-14 Fortinet, Inc. Dns-enabled communication between heterogeneous devices
CN106487579A (en) * 2015-08-31 2017-03-08 西门子公司 For providing method and the webserver part of access equipment configuration data
CN106790759A (en) * 2016-12-29 2017-05-31 赛尔网络有限公司 IPv4/IPv6 converting systems and method based on SDN
CN109451097A (en) * 2019-01-02 2019-03-08 北京宏图佳都通信设备有限公司 IPv4/IPv6 address conversion system

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
吴冬昊: "《学苑新叶 贵州师范大学2007届本科毕业生优秀毕业论文选集》", 30 April 2008 *
张志敏: "web系统数据的安全性研究", 《吉林工程技术师范学院学报》 *
曾园园: "《物联网导论》", 30 September 2012 *
李杨等: "一种基于云服务的即时通讯软件的设计与实现", 《软件》 *

Similar Documents

Publication Publication Date Title
US11165604B2 (en) Method and system used by terminal to connect to virtual private network, and related device
US11303647B1 (en) Synthetic request injection to disambiguate bypassed login events for cloud policy enforcement
US11985168B2 (en) Synthetic request injection for secure access service edge (SASE) cloud architecture
US8024785B2 (en) Method and data processing system for intercepting communication between a client and a service
US11190550B1 (en) Synthetic request injection to improve object security posture for cloud security enforcement
US7738373B2 (en) Method and apparatus for rapid location of anomalies in IP traffic logs
US20220345495A1 (en) Application-specific data flow for synthetic request injection
JP5333263B2 (en) Access control system and access control method
US20220345492A1 (en) Network intermediary with network request-response mechanism
US11888902B2 (en) Object metadata-based cloud policy enforcement using synthetic request injection
CN101248615B (en) Suspension and resumption of secure data connection session
US20220345500A1 (en) Cloud policy enforcement with synthetic request injection logic
KR20220028102A (en) Methods and systems for effective cyber protection of mobile devices
US20220345490A1 (en) Synthetic Request Injection to Retrieve Expired Metadata for Cloud Policy Enforcement
WO2013006296A1 (en) Methods and apparatus for secure data sharing
EP2725762B1 (en) Deciphering internet protocol (IP) security in an IP multimedia subsystem (IMS) using a monitoring system
US20100125668A1 (en) Methods, Systems, and Computer Program Products for Enhancing Internet Security for Network Subscribers
JP5864598B2 (en) Method and system for providing service access to a user
US20130166677A1 (en) Role-based access control method and apparatus in distribution system
WO2005029811A1 (en) Remote ipsec security association management
US7684385B2 (en) Inter-enterprise telephony using a central brokerage device
Siekkinen et al. Beyond the Future Internet--Requirements of Autonomic Networking Architectures to Address Long Term Future Networking Challenges
Koch et al. Securing HTTP/3 Web Architecture in the Cloud
CN111818002A (en) Internet interaction system based on web information technology
WO2022226202A1 (en) Synthetic request injection to retrieve object metadata for cloud policy enforcement

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20201023

RJ01 Rejection of invention patent application after publication