CN113572844A - Industrial internet identification analysis method - Google Patents

Industrial internet identification analysis method Download PDF

Info

Publication number
CN113572844A
CN113572844A CN202110852615.7A CN202110852615A CN113572844A CN 113572844 A CN113572844 A CN 113572844A CN 202110852615 A CN202110852615 A CN 202110852615A CN 113572844 A CN113572844 A CN 113572844A
Authority
CN
China
Prior art keywords
analysis
client
identification
server
dns
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110852615.7A
Other languages
Chinese (zh)
Inventor
刘巍
贾高鹏
徐泺
韩红强
范科峰
张群
李崇
陈海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Electronics Standardization Institute
Original Assignee
China Electronics Standardization Institute
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Electronics Standardization Institute filed Critical China Electronics Standardization Institute
Priority to CN202110852615.7A priority Critical patent/CN113572844A/en
Publication of CN113572844A publication Critical patent/CN113572844A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/02Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/45Network directories; Name-to-address mapping
    • H04L61/4505Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols
    • H04L61/4511Network directories; Name-to-address mapping using standardised directories; using standardised directory access protocols using domain name system [DNS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses an industrial internet mark analysis method.A user host runs a mark analysis client; the client initiates an application to the analysis server; the analysis server retrieves an identification analysis database according to identification information carried in an application sent by the client; if the analysis is successful, returning the analysis result to the client in a web json mode; if the analysis is unsuccessful, analyzing the identification information through a traditional DNS analysis system, and returning an analysis result to the client in a web json mode; the client side obtains an identification analysis result according to the web json data returned by the analysis server; and the client accesses the target application server corresponding to the identification analysis result through protocols such as HTTP, HTTPS, FTP and the like to obtain a webpage or a data file. The invention provides an industrial internet identification analyzing method, which adopts a new technology of a non-DNS analyzing mechanism to eliminate the huge hidden trouble of national information safety caused by the limitation of the DNS analyzing mechanism.

Description

Industrial internet identification analysis method
Technical Field
The invention relates to the field of industrial internet, in particular to an industrial internet identification analysis method.
Background
The DNS is a set of mapping systems from domain names to IP, a computer and network service naming system organized in a hierarchy of domains, used in TCP/IP networks, which provides services that are used to convert host names and domain names to IP addresses. DNS is an application layer protocol that in fact works for other application layer protocols, including but not limited to HTTP and SMTP and FTP, to resolve user-supplied hostnames to IP addresses.
The specific process is as follows:
1. the user host runs a DNS client.
2. The browser extracts the domain name field from the received url and transmits the domain name field to the client of the DNS application.
And 3, the DNS client side sends a query message to the DNS server side, wherein the message contains a host name field to be accessed.
4. The DNS client will eventually receive an answer message that includes the IP address corresponding to the host name.
5. The browser, upon receiving the IP address from the DNS, can initiate a TCP connection to the HTTP server located at that IP address.
The domain name resolution system (DNS) of the internet adopts a central centralized management mode, so that the operation of the internet in each country is highly dependent on the original root domain name resolution server located in the united states from the perspective of domain name resolution. The DNS root node is not mastered in China, only the DNS root mirror node is deployed, data synchronization is carried out passively, and many hidden dangers exist in the aspects of performance, safety, management and the like. The distribution of the domain names of the Internet is unequal to the management pattern, so that except a few countries, other countries are at high risk, the risk that the Internet system of one country is deleted from the Internet society as a whole exists, and all countries in the world cannot access the website under the domain name of the country, so that the industrial Internet identification analysis method is provided.
Disclosure of Invention
Based on the technical problems in the background art, the invention provides an industrial internet identification analysis method to solve the problems in the background art.
The invention provides the following technical scheme:
an industrial internet identification analysis method comprises the following steps:
A. running an identifier analysis client on a user host;
B. the client initiates an application to the analysis server;
C. the analysis server retrieves an identification analysis database according to identification information carried in an application sent by the client;
D. if the analysis is successful, returning the analysis result to the client in a web json mode; if the analysis is unsuccessful, analyzing the identification information through a traditional DNS analysis system, and returning an analysis result to the client in a web json mode;
E. the client side obtains an identification analysis result according to the web json data returned by the analysis server;
F. and the client accesses the target application server corresponding to the identification analysis result through protocols such as HTTP, HTTPS, FTP and the like to obtain a webpage or a data file.
Preferably, an identifier resolution server is deployed in the step E, and an identifier resolution database is stored.
The invention provides an industrial internet identification analyzing method, which adopts a new technology of a non-DNS analyzing mechanism to eliminate the huge hidden trouble of national information safety caused by the limitation of the DNS analyzing mechanism.
Drawings
FIG. 1 is an identification resolution diagram of the present invention;
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, the present invention provides a technical solution:
the first embodiment is as follows:
an industrial internet identification analysis method comprises the following steps:
A. running an identifier analysis client on a user host;
B. the client initiates an application to the analysis server;
C. the analysis server retrieves an identification analysis database according to identification information carried in an application sent by the client;
D. if the analysis is successful, returning the analysis result to the client in a web json mode; if the analysis is unsuccessful, analyzing the identification information through a traditional DNS analysis system, and returning an analysis result to the client in a web json mode;
E. the client side obtains an identification analysis result according to the web json data returned by the analysis server;
F. and the client accesses the target application server corresponding to the identification analysis result through protocols such as HTTP, HTTPS, FTP and the like to obtain a webpage or a data file.
Step E, a mark analysis server is deployed and a mark analysis database is stored; and communicating the client and the server in a web json mode, receiving and processing an identifier analysis request lifted by the client, and returning an identifier analysis result. The traditional DNS analysis system is bypassed in the field of identification analysis, and the system is not limited by a source root domain name server any more, so that the autonomous control of information safety in the aspect of identification analysis is realized.
The identification analysis based on the web JSON is a non-DNS analysis system, is applied to the identification analysis of industrial internet, realizes autonomous controllability on the network information security, is a subset of JSON based on JavaScript mapping Language, Standard ECMA-2623 rd Edition-Decumber 1999, is a light-weight data exchange format, is easy to read and write, and is convenient for a machine to analyze and generate.
Example two:
JSON Web Token (JWT) is a very light specification; this specification allows us to use JWT to pass secure and reliable information between users and servers; JWT for short, and performs identity authentication in the HTTP communication process;
A. the client logs in the server through a user name and a password;
B. the server side verifies the identity of the client side;
C. the server generates a Token for the user and returns the Token to the client;
D. a client initiates a request, and the Token needs to be carried;
E. after receiving the request, the server side firstly verifies Token and then returns data;
F. the client saves Token to the local browser, typically in a cookie.
Principle of JWT
The JWT principle is that after the server authenticates, a JSON object is generated and sent back to the user;
later, when the user communicates with the server, the JSON object needs to be sent back; the server only determines the user identity by the object; in order to prevent the user from tampering with the data, the server will add a signature when generating the object;
the server does not store any session data, that is, the server becomes stateless, so that the expansion is easier to realize;
JWT usage pattern
The client receives the JWT returned by the server, and the JWT can be stored in the Cookie or the localStorage;
thereafter, each time the client communicates with the server, the JWT is brought on. You can place it in Cookie to send automatically, but this can not cross the domain, so better practice is to place it in HTTP solicited header information Authorization field;
alternatively, when the domain is crossed, the JWT is placed in the body of the POST request;
characteristics of JWT
JWT is not encrypted by default, but can be encrypted, and can be encrypted once by using a key after generating the original Token;
in the case that the JWT is not encrypted, the secret data cannot be written to the JWT;
JWT can be used not only for authentication, but also for exchanging information; the JWT is effectively used, so that the times of querying the database by the server can be reduced;
the biggest disadvantage of JWT is that since the server does not save the session state, it is not possible to revoke a token, or change the authority of a token, during use; that is, once the JWT issues, it will always be valid until it expires unless the server deploys additional logic;
the JWT itself contains authentication information, and once compromised, anyone can obtain all rights to the token; to reduce theft, the validity period of the JWT should be set relatively short; for some more important authorities, the user should be authenticated again when in use;
to reduce theft, JWT should not use HTTP protocol clear code transport, using HTTPs protocol transport.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art should be able to cover the technical scope of the present invention and the equivalent alternatives or modifications according to the technical solution and the inventive concept of the present invention within the technical scope of the present invention.

Claims (2)

1. An industrial internet identification analysis method is characterized by comprising the following steps:
A. running an identifier analysis client on a user host;
B. the client initiates an application to the analysis server;
C. the analysis server retrieves an identification analysis database according to identification information carried in an application sent by the client;
D. if the analysis is successful, returning the analysis result to the client in a webjson mode; if the analysis is unsuccessful, analyzing the identification information through a traditional DNS analysis system, and returning an analysis result to the client in a webjson mode;
E. the client side obtains an identification analysis result according to webjson data returned by the analysis server;
F. and the client accesses the target application server corresponding to the identification analysis result through protocols such as HTTP, HTTPS, FTP and the like to obtain a webpage or a data file.
2. The method for resolving the industrial internet mark as claimed in claim 1, wherein: and step E, deploying an identification analysis server and storing an identification analysis database.
CN202110852615.7A 2021-07-27 2021-07-27 Industrial internet identification analysis method Pending CN113572844A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110852615.7A CN113572844A (en) 2021-07-27 2021-07-27 Industrial internet identification analysis method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110852615.7A CN113572844A (en) 2021-07-27 2021-07-27 Industrial internet identification analysis method

Publications (1)

Publication Number Publication Date
CN113572844A true CN113572844A (en) 2021-10-29

Family

ID=78168085

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110852615.7A Pending CN113572844A (en) 2021-07-27 2021-07-27 Industrial internet identification analysis method

Country Status (1)

Country Link
CN (1) CN113572844A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114500458A (en) * 2021-12-06 2022-05-13 中国电子技术标准化研究院 Novel ORS (object relational mapping) analysis method based on local analysis

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110708322A (en) * 2019-10-12 2020-01-17 北京工业大学 Method for realizing proxy service of industrial internet identification analysis system
CN111611613A (en) * 2020-04-28 2020-09-01 网络通信与安全紫金山实验室 ICN-based industrial internet identification analysis system and data access method
CN111966868A (en) * 2020-09-07 2020-11-20 航天云网数据研究院(广东)有限公司 Data management method based on identification analysis and related equipment
CN112085417A (en) * 2020-09-24 2020-12-15 北京工业大学 Industrial Internet identification distribution and data management method based on block chain
CN112600674A (en) * 2020-12-04 2021-04-02 中国农业银行股份有限公司深圳市分行 User security authentication method and device for front-end and back-end separation system and storage medium
CN112929464A (en) * 2021-02-22 2021-06-08 中国电子信息产业集团有限公司第六研究所 Identification analysis method, device, system, dynamic adapter and readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110708322A (en) * 2019-10-12 2020-01-17 北京工业大学 Method for realizing proxy service of industrial internet identification analysis system
CN111611613A (en) * 2020-04-28 2020-09-01 网络通信与安全紫金山实验室 ICN-based industrial internet identification analysis system and data access method
CN111966868A (en) * 2020-09-07 2020-11-20 航天云网数据研究院(广东)有限公司 Data management method based on identification analysis and related equipment
CN112085417A (en) * 2020-09-24 2020-12-15 北京工业大学 Industrial Internet identification distribution and data management method based on block chain
CN112600674A (en) * 2020-12-04 2021-04-02 中国农业银行股份有限公司深圳市分行 User security authentication method and device for front-end and back-end separation system and storage medium
CN112929464A (en) * 2021-02-22 2021-06-08 中国电子信息产业集团有限公司第六研究所 Identification analysis method, device, system, dynamic adapter and readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114500458A (en) * 2021-12-06 2022-05-13 中国电子技术标准化研究院 Novel ORS (object relational mapping) analysis method based on local analysis
CN114500458B (en) * 2021-12-06 2023-08-01 中国电子技术标准化研究院 Novel ORS analysis method based on local analysis

Similar Documents

Publication Publication Date Title
CN102006299B (en) Trustworthy internet-oriented entity ID (Identity)-based ID authentication method and system
US11706036B2 (en) Systems and methods for preserving privacy of a registrant in a domain name system (“DNS”)
CN102638454B (en) Plug-in type SSO (single signon) integration method oriented to HTTP (hypertext transfer protocol) identity authentication protocol
CN100534092C (en) Method and system for stepping up to certificate-based authentication without breaking an existing ssl session
US6691232B1 (en) Security architecture with environment sensitive credential sufficiency evaluation
US8132239B2 (en) System and method for validating requests in an identity metasystem
US6668322B1 (en) Access management system and method employing secure credentials
US20040003287A1 (en) Method for authenticating kerberos users from common web browsers
US20080222714A1 (en) System and method for authentication upon network attachment
US20080216160A1 (en) Robust digest authentication method
CN105554098A (en) Device configuration method, server and system
JP2000349747A (en) Public key managing method
KR20120104193A (en) Method and system for entity public key acquiring, certificate validation and authentication by introducing an online credible third party
CN113055363A (en) Identification analysis system implementation method based on block chain trust mechanism
US11165768B2 (en) Technique for connecting to a service
CN101039181B (en) Method for preventing service function entity of general authentication framework from attack
CN103023856A (en) Single sign-on method, single sign-on system, information processing method and information processing system
CN109274579A (en) It is a kind of that user's uniform authentication method is applied based on wechat platform more
CN114127764A (en) Destination addressing associated with distributed ledger
CN113572844A (en) Industrial internet identification analysis method
CN102083066A (en) Unified safety authentication method and system
KR102118556B1 (en) Method for providing private blockchain based privacy information management service
CN103118025A (en) Single sign-on method based on network access certification, single sign-on device and certificating server
CN114006724B (en) Method and system for discovering and authenticating encryption DNS resolver
CN106330894B (en) SAVI proxy authentication system and method based on link-local address

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination