CN113922972B - Data forwarding method and device based on MD5 identification code - Google Patents

Data forwarding method and device based on MD5 identification code Download PDF

Info

Publication number
CN113922972B
CN113922972B CN202111508081.2A CN202111508081A CN113922972B CN 113922972 B CN113922972 B CN 113922972B CN 202111508081 A CN202111508081 A CN 202111508081A CN 113922972 B CN113922972 B CN 113922972B
Authority
CN
China
Prior art keywords
data
identification code
node
data packet
forwarding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111508081.2A
Other languages
Chinese (zh)
Other versions
CN113922972A (en
Inventor
刘加瑞
杨星
朱东涛
梁振宇
周文柏
沈传宝
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Huayuan Information Technology Co Ltd
Original Assignee
Beijing Huayuan Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Huayuan Information Technology Co Ltd filed Critical Beijing Huayuan Information Technology Co Ltd
Priority to CN202111508081.2A priority Critical patent/CN113922972B/en
Publication of CN113922972A publication Critical patent/CN113922972A/en
Application granted granted Critical
Publication of CN113922972B publication Critical patent/CN113922972B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD

Abstract

The disclosure provides a data forwarding method and device based on an MD5 identification code, wherein the method comprises the following steps: receiving a data packet sent by a source end node, wherein the data packet comprises an MD5 identification code; extracting the MD5 identification code from the data packet; calling a corresponding interface according to the MD5 identification code, activating a corresponding data forwarding process, and sending the data packet to a target node; and closing the corresponding data forwarding process in response to sending the data packet to the target node. In this way, the routing flexibility and efficiency of the access request can be improved in the process of anonymous access of the user, and therefore the user experience is improved.

Description

Data forwarding method and device based on MD5 identification code
Technical Field
Embodiments of the present disclosure relate generally to the field of data encryption transmission technologies, and in particular, to a data forwarding method and apparatus based on an MD5 identification code.
Background
With the continuous development of internet technology, the internet has become an important part of people's life, work and entertainment. People can browse various information through the internet and can perform activities such as payment, file sending and receiving, instant messaging and the like.
With the increasing dependence of people on the internet, the information security in the internet is also very important. Currently, a part of data traffic generated in the internet may carry a fixed feature, which may be represented as a character string with a fixed length, for example. In this way, an attacker can determine which protocol is used for transmitting the current data traffic by intercepting the data traffic and then analyzing the fixed characteristics of the data traffic. Further, an attacker can steal or tamper the data traffic in a targeted manner according to the determined protocol, so that the information security of the user can be endangered.
In the prior art, the access request can be routed through multiple levels of nodes, so that the information of the user is hidden and is not easy to be directly acquired. However, in the prior art, when the access request of the user is routed through the multi-level nodes, the identity information of the user needs to be verified step by step to determine the next-level node of the routing access request, so that the routing process is inflexible, the routing efficiency is greatly reduced, and the user experience is affected.
Disclosure of Invention
According to the embodiment of the disclosure, a data forwarding method based on the MD5 identification code is provided, which is used for improving the routing flexibility and efficiency of an access request in the process of anonymous access of a user, so as to improve the user experience.
In a first aspect of the present disclosure, a data forwarding method based on an MD5 identification code is provided, including:
receiving a data packet sent by a source end node, wherein the data packet comprises an MD5 identification code;
extracting the MD5 identification code from the data packet;
calling a corresponding interface according to the MD5 identification code, activating a corresponding data forwarding process, and sending the data packet to a target node;
and closing the corresponding data forwarding process in response to sending the data packet to the target node.
In some embodiments, the method further includes a process of generating the MD5 identification code in advance, specifically including:
selecting a preset number of nodes from a node network as forwarding nodes, generating node paths, and acquiring IP addresses and port numbers of the forwarding nodes;
generating a current time point, and splicing the current time point and IP addresses and port numbers of all forwarding nodes into a character sequence;
and processing the character sequence by using an information abstract algorithm to generate an MD5 identification code.
In some embodiments, after generating the MD5 identification code, the method further comprises:
and the upper node sends the information of the lower node corresponding to the lower node based on the MD5 identification code and the MD5 identification code to the corresponding node, and each level of nodes store the information of the lower node and the corresponding MD5 identification code in a routing table of each level of nodes.
In some embodiments, after receiving the data packet, the nodes in the node path extract the corresponding MD5 identification code, determine information of a lower node according to the MD5 identification code, and send the data packet and the MD5 identification code to the lower node;
the above process is repeated until the last node in the node path receives the data packet and the MD5 identification code, and the last node transmits the data packet to the destination node according to the IP address of the destination node included in the data packet.
In some embodiments, further comprising:
storing the MD5 identification code in the packet header of the data packet in the form of an SHA256 sequence, wherein the SHA256 sequence comprises an encrypted data check code storage bit, an encrypted data check complement storage bit, a starting identification bit of encrypted data in the data storage bit, a storage bit of encrypted data length, and a data storage bit.
In some embodiments, said storing said MD5 identification code in the header of said data packet in the form of a SHA256 sequence comprises:
the method comprises the steps of generating n random numbers in advance by using a random number generation algorithm, writing the generated n random numbers into data storage bits of an SHA256 sequence, and replacing the random numbers of corresponding digits in the data storage bits by using an MD5 identification code to be stored when the MD5 identification code needs to be stored.
In some embodiments, said extracting said MD5 identification code from said data packet comprises:
intercepting a character sequence with the same data length as the SHA256 sequence from a header of the data packet, determining that the intercepted character sequence comprises an MD5 identification code in response to the intercepted character sequence satisfying (s + leftover)% parity = = 0, wherein s is the sum of integer values composed of data in data storage bits, data in the data storage bits constitutes one integer value every 4 bits, leftover is an encrypted data check code, parity is an encrypted data check complement, and extracting the MD5 identification code according to a start identification bit of the encrypted data in the data storage bits, the storage bits of the encrypted data length, and corresponding characters in the data storage bits.
In a second aspect of the present disclosure, there is provided a data forwarding apparatus based on an MD5 identification code, including:
the data receiving module is used for receiving a data packet sent by a source end node, and the data packet comprises an MD5 identification code;
an MD5 identification code extraction module for extracting the MD5 identification code from the data packet;
the data sending module is used for sending the data packet to a target node according to the MD5 identification code;
and the process management module is used for calling a corresponding interface according to the MD5 identification code, activating a corresponding data forwarding process, and closing the corresponding data forwarding process in response to sending the data packet to the target node.
In a third aspect of the present disclosure, an electronic device is provided, comprising a memory having stored thereon a computer program and a processor implementing the method as described above when executing the program.
In a fourth aspect of the present disclosure, a computer-readable storage medium is provided, on which a computer program is stored, which program, when being executed by a processor, is adapted to carry out the method as set forth above.
By the data forwarding method based on the MD5 identification code, the routing flexibility and efficiency of the access request can be improved in the anonymous access process of the user, so that the user experience is improved.
It should be understood that the statements herein reciting aspects are not intended to limit the critical or essential features of the embodiments of the present disclosure, nor are they intended to limit the scope of the present disclosure. Other features of the present disclosure will become apparent from the following description.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. In the drawings, like or similar reference characters designate like or similar elements, and wherein:
fig. 1 shows a flowchart of a data forwarding method based on an MD5 identification code according to a first embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a data forwarding apparatus based on an MD5 identification code according to a second embodiment of the present disclosure;
fig. 3 shows a schematic structural diagram of a data forwarding device based on an MD5 identification code according to a third embodiment of the present disclosure.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present disclosure more clear, the technical solutions of the embodiments of the present disclosure will be described clearly and completely with reference to the drawings in the embodiments of the present disclosure, and it is obvious that the described embodiments are some, but not all embodiments of the present disclosure. All other embodiments, which can be derived by a person skilled in the art from the embodiments disclosed herein without making any creative effort, shall fall within the protection scope of the present disclosure.
In addition, the term "and/or" herein is only one kind of association relationship describing an associated object, and means that there may be three kinds of relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship.
The data forwarding method based on the MD5 identification code can optimize the route of the access request of the user in the node network, and call different processes to forward different data packets in the node based on the MD5 identification code, so that the forwarding processes cannot be influenced mutually, the route flexibility and efficiency of the access request are improved, and the user experience is improved.
Specifically, as shown in fig. 1, it is a flowchart of a data forwarding method based on an MD5 identification code according to a first embodiment of the present disclosure. As can be seen from fig. 1, the data forwarding method based on the MD5 identification code of this embodiment may include the following steps:
s101: and receiving a data packet sent by the source end node, wherein the data packet comprises an MD5 identification code.
S102: extracting the MD5 identification code from the data packet.
S103: and calling a corresponding interface according to the MD5 identification code, activating a corresponding data forwarding process, and sending the data packet to a target node.
S104: and closing the corresponding data forwarding process in response to sending the data packet to the target node.
In the embodiment of the present disclosure, when a source end node sends a data packet to a target node, the data packet may be sent by the method of the embodiment of the present disclosure. Specifically, a node path needs to be constructed, and the data packet is forwarded through the constructed node path. When a node path is constructed, a preset number of nodes can be selected from a node network to serve as forwarding nodes, and the node path is generated. After a node path is generated, the IP address and the port number of a forwarding node can be obtained, the current time point is obtained, and the current time point and the IP addresses and the port numbers of all the forwarding nodes are spliced into a character sequence; and processing the character sequence by using an information abstract algorithm to generate an MD5 identification code.
After the MD5 identification code is generated, the superior node in the node path sends the information of the inferior node corresponding to the lower node based on the MD5 identification code and the MD5 identification code to the corresponding node, and each level of node stores the information of the inferior node and the corresponding MD5 identification code in a routing table of the level of node. In this way, the nodes in the node path for forwarding the data packet all store the routing table in which the MD5 identification code and the lower node corresponding to the MD5 identification code are recorded.
When a data packet is forwarded, after a node in a node path receives the data packet, extracting a corresponding MD5 identification code, determining information of a lower node according to the MD5 identification code, and sending the data packet and the MD5 identification code to the lower node;
the above process is repeated until the last node in the node path receives the data packet and the MD5 identification code, and the last node transmits the data packet to the destination node according to the IP address of the destination node included in the data packet.
The MD5 identification code is stored in the packet header of the data packet in the form of an SHA256 sequence, wherein the SHA256 sequence comprises an encrypted data check code storage bit, an encrypted data check complement storage bit, a starting identification bit of the encrypted data in the data storage bit, a storage bit of the encrypted data length, and a data storage bit.
The method comprises the steps of generating n random numbers in advance by using a random number generation algorithm, writing the n generated random numbers into data storage bits of an SHA256 sequence, replacing random numbers of corresponding digits in the data storage bits by using an MD5 identification code to be stored when the MD5 identification code needs to be stored, storing the MD5 identification code in the SHA256 sequence, and inserting the SHA256 sequence into packet header data of a data packet.
In the data forwarding process, when the current node in the node path receives a data packet which is sent by the source end node and forwarded by the corresponding superior node, extracting an MD5 identification code in header data of the data packet, specifically, intercepting a character sequence having a data length identical to that of the SHA256 sequence from the header of the data packet, determining that the intercepted character sequence includes an MD5 identification code in response to the intercepted character sequence satisfying (s + leftover)% parity = = 0, wherein s is the sum of integer values composed of data in the data storage bits, the data in the data storage bits is composed of an integer value every 4 bits, leftover is an encrypted data check code, parity is an encrypted data check complement, and extracting the MD5 identification code according to the initial identification bit of the encrypted data in the data storage bits, the storage bits of the length of the encrypted data and the corresponding characters in the data storage bits.
In the embodiment of the present disclosure, the SHA256 sequence is a 256-bit binary character sequence, which is converted to a hexadecimal character of 64 bits. In some embodiments, bits 0 to 3 (4 bits in total) are stored bits of an encrypted data check code for storing the encrypted data check code, bits 4 to 7 (4 bits in total) are stored bits of an encrypted data check complement for storing the encrypted data check complement, bit 8 is a start identification bit of the encrypted data in the stored bits of the data, bit 9 is a stored bit of the length of the encrypted data for storing a length value of the encrypted data, and bits 10 to 63 are stored bits of the data for storing an MD5 identification code.
After the MD5 identification code is extracted, a corresponding interface is called according to the MD5 identification code, a corresponding data forwarding process is activated, the received data packet is forwarded, the data packet is sent to a corresponding lower node, and after the data packet is forwarded, the corresponding process is closed, so that one forwarding task is guaranteed to be a process, and the forwarding tasks are not influenced mutually. Or, after the data packet is sent to the target node, the corresponding data forwarding process may be closed.
The method of the embodiment can improve the routing flexibility and efficiency of the access request in the anonymous access process of the user, thereby improving the user experience.
It is noted that while for simplicity of explanation, the foregoing method embodiments have been described as a series of acts or combination of acts, it will be appreciated by those skilled in the art that the present disclosure is not limited by the order of acts, as some steps may, in accordance with the present disclosure, occur in other orders and concurrently. Further, those skilled in the art should also appreciate that the embodiments described in this specification are all alternative embodiments and that the acts and modules involved are not necessarily essential to the disclosure.
The above is a description of embodiments of the method, and the embodiments of the apparatus are further described below.
Fig. 2 is a schematic structural diagram of a data forwarding apparatus based on an MD5 identification code according to a second embodiment of the present disclosure. The data forwarding device based on the MD5 identification code of this embodiment includes:
the data receiving module 201 is configured to receive a data packet sent by a source end node, where the data packet includes an MD5 identification code.
An MD5 identifier code extraction module 202, configured to extract the MD5 identifier code from the data packet.
And the data sending module 203 is used for sending the data packet to the target node according to the MD5 identification code.
And the process management module 204 is configured to call a corresponding interface according to the MD5 identifier, activate a corresponding data forwarding process, and close the corresponding data forwarding process in response to sending the data packet to the target node.
It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working process of the described module may refer to the corresponding process in the foregoing method embodiment, and is not described herein again.
Fig. 3 shows a schematic structural diagram of a data forwarding device based on an MD5 identification code according to a third embodiment of the present disclosure. As shown, device 300 includes a Central Processing Unit (CPU) 301 that may perform various appropriate actions and processes in accordance with computer program instructions stored in a Read Only Memory (ROM) 302 or loaded from a storage unit 308 into a Random Access Memory (RAM) 303. In the RAM 303, various programs and data necessary for the operation of the device 300 can also be stored. The CPU 301, ROM 302, and RAM 303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
Various components in device 300 are connected to I/O interface 305, including: an input unit 306 such as a keyboard, a mouse, or the like; an output unit 307 such as various types of displays, speakers, and the like; a storage unit 308 such as a magnetic disk, optical disk, or the like; and a communication unit 309 such as a network card, modem, wireless communication transceiver, etc. The communication unit 309 allows the device 300 to exchange information/data with other devices via a computer network such as the internet and/or various telecommunication networks.
The processing unit 301, which tangibly embodies a machine-readable medium, such as the storage unit 308, performs the various methods and processes described above. In some embodiments, part or all of the computer program may be loaded and/or installed onto device 300 via ROM 302 and/or communication unit 309. When the computer program is loaded into the RAM 703 and executed by the CPU 301, one or more steps of the method described above may be performed. Alternatively, in other embodiments, the CPU 301 may be configured to perform the above-described method in any other suitable manner (e.g., by way of firmware).
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a load programmable logic device (CPLD), and the like.
Program code for implementing the methods of the present disclosure may be written in any combination of one or more programming languages. These program codes may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the program codes, when executed by the processor or controller, cause the functions/operations specified in the flowchart and/or block diagram to be performed. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. A machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
Further, while operations are depicted in a particular order, this should be understood as requiring that such operations be performed in the particular order shown or in sequential order, or that all illustrated operations be performed, to achieve desirable results. Under certain circumstances, multitasking and parallel processing may be advantageous. Likewise, while several specific implementation details are included in the above discussion, these should not be construed as limitations on the scope of the disclosure. Certain features that are described in the context of separate embodiments can also be implemented in combination in a single implementation. Conversely, various features that are described in the context of a single implementation can also be implemented in multiple implementations separately or in any suitable subcombination.
Although the subject matter has been described in language specific to structural features and/or methodological acts, it is to be understood that the subject matter defined in the appended claims is not necessarily limited to the specific features or acts described above. Rather, the specific features and acts described above are disclosed as example forms of implementing the claims.

Claims (7)

1. A data forwarding method based on MD5 identification code is characterized by comprising the following steps:
receiving a data packet sent by a source end node, wherein the data packet comprises an MD5 identification code, and the MD5 identification code is stored in a packet header of the data packet in the form of an SHA256 sequence, wherein the SHA256 sequence comprises an encrypted data check code storage bit, an encrypted data check complement storage bit, a starting identification bit of encrypted data in the data storage bit, a storage bit of an encrypted data length, and a data storage bit; the MD5 identification code is generated by: selecting a preset number of nodes from a node network as forwarding nodes, generating node paths, and acquiring IP addresses and port numbers of the forwarding nodes; generating a current time point, and splicing the current time point and IP addresses and port numbers of all forwarding nodes into a character sequence; processing the character sequence by using an information abstract algorithm to generate an MD5 identification code;
extracting the MD5 identification code from the data packet, including: intercepting a character sequence with the same data length as the SHA256 sequence from a header of the data packet, determining that the intercepted character sequence comprises an MD5 identification code in response to the intercepted character sequence satisfying (s + leftover)% parity = = 0, wherein s is the sum of integer values composed of data in data storage bits, data in the data storage bits constitutes one integer value every 4 bits, leftover is an encrypted data check code, parity is an encrypted data check complement, and the MD5 identification code is extracted according to a start identification bit of the encrypted data in the data storage bits, the storage bits of the encrypted data length, and corresponding characters in the data storage bits;
calling a corresponding interface according to the MD5 identification code, activating a corresponding data forwarding process, and sending the data packet to a target node;
and closing the corresponding data forwarding process in response to sending the data packet to the target node.
2. The data forwarding method of claim 1, wherein after generating the MD5 identification code, the method further comprises:
and the upper node sends the information of the lower node corresponding to the lower node based on the MD5 identification code and the MD5 identification code to the corresponding node, and each level of nodes store the information of the lower node and the corresponding MD5 identification code in a routing table of each level of nodes.
3. The data forwarding method of claim 2, wherein after receiving the data packet, the nodes in the node path extract the corresponding MD5 identification code, determine information of a subordinate node according to the MD5 identification code, and send the data packet and the MD5 identification code to the subordinate node;
the above process is repeated until the last node in the node path receives the data packet and the MD5 identification code, and the last node transmits the data packet to the destination node according to the IP address of the destination node included in the data packet.
4. The data forwarding method of claim 1, wherein the storing the MD5 identification code in the header of the data packet in the form of a SHA256 sequence comprises:
the method comprises the steps of generating n random numbers in advance by using a random number generation algorithm, writing the generated n random numbers into data storage bits of an SHA256 sequence, and replacing the random numbers of corresponding digits in the data storage bits by using an MD5 identification code to be stored when the MD5 identification code needs to be stored.
5. A data forwarding apparatus based on MD5 identification code, comprising:
the data receiving module is used for receiving a data packet sent by a source end node, wherein the MD5 identification code is stored in a packet header of the data packet in the form of an SHA256 sequence, and the SHA256 sequence comprises an encrypted data check code storage bit, an encrypted data check complement storage bit, a starting identification bit of encrypted data in the data storage bit, a storage bit of encrypted data length, and a data storage bit; the MD5 identification code is generated by: selecting a preset number of nodes from a node network as forwarding nodes, generating node paths, and acquiring IP addresses and port numbers of the forwarding nodes; generating a current time point, and splicing the current time point and IP addresses and port numbers of all forwarding nodes into a character sequence; processing the character sequence by using an information abstract algorithm to generate an MD5 identification code; an MD5 identification code extraction module for extracting the MD5 identification code from the data packet, comprising: intercepting a character sequence with the same data length as the SHA256 sequence from a header of the data packet, determining that the intercepted character sequence comprises an MD5 identification code in response to the intercepted character sequence satisfying (s + leftover)% parity = = 0, wherein s is the sum of integer values composed of data in data storage bits, data in the data storage bits constitutes one integer value every 4 bits, leftover is an encrypted data check code, parity is an encrypted data check complement, and the MD5 identification code is extracted according to a start identification bit of the encrypted data in the data storage bits, the storage bits of the encrypted data length, and corresponding characters in the data storage bits;
the data sending module is used for sending the data packet to a target node according to the MD5 identification code;
and the process management module is used for calling a corresponding interface according to the MD5 identification code, activating a corresponding data forwarding process, and closing the corresponding data forwarding process in response to sending the data packet to the target node.
6. An electronic device comprising a memory and a processor, the memory having stored thereon a computer program, wherein the processor, when executing the program, implements the method of any of claims 1-4.
7. A computer-readable storage medium, on which a computer program is stored, which program, when being executed by a processor, carries out the method according to any one of claims 1 to 4.
CN202111508081.2A 2021-12-10 2021-12-10 Data forwarding method and device based on MD5 identification code Active CN113922972B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111508081.2A CN113922972B (en) 2021-12-10 2021-12-10 Data forwarding method and device based on MD5 identification code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111508081.2A CN113922972B (en) 2021-12-10 2021-12-10 Data forwarding method and device based on MD5 identification code

Publications (2)

Publication Number Publication Date
CN113922972A CN113922972A (en) 2022-01-11
CN113922972B true CN113922972B (en) 2022-03-08

Family

ID=79248520

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111508081.2A Active CN113922972B (en) 2021-12-10 2021-12-10 Data forwarding method and device based on MD5 identification code

Country Status (1)

Country Link
CN (1) CN113922972B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116418600B (en) * 2023-06-09 2023-08-15 安徽华云安科技有限公司 Node security operation and maintenance method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474713A (en) * 2018-11-13 2019-03-15 杭州数梦工场科技有限公司 Message forwarding method and device
CN112995040A (en) * 2021-04-29 2021-06-18 中国人民解放军国防科技大学 Message path tracing method and device based on equipment identification calculation

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8413248B2 (en) * 2006-03-22 2013-04-02 Michael B. Rash Method for secure single-packet remote authorization
US9479323B2 (en) * 2011-01-28 2016-10-25 Nec Corporation Communication system, forwarding node, control device, communication control method, and program
CN102647625B (en) * 2012-05-03 2014-02-26 重庆邮电大学 Multiple video forwarding method based on port numbers and IP addresses

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109474713A (en) * 2018-11-13 2019-03-15 杭州数梦工场科技有限公司 Message forwarding method and device
CN112995040A (en) * 2021-04-29 2021-06-18 中国人民解放军国防科技大学 Message path tracing method and device based on equipment identification calculation

Also Published As

Publication number Publication date
CN113922972A (en) 2022-01-11

Similar Documents

Publication Publication Date Title
TWI659300B (en) Method and device for providing equipment identification
CN113438172B (en) Data transmission method and device based on multi-level node network
CN103607385A (en) Method and apparatus for security detection based on browser
CN106878199B (en) Configuration method and device of access information
CN111061685B (en) Log query method and device, node equipment and storage medium
CN114338510B (en) Data forwarding method and system for controlling and forwarding separation
CN111343207B (en) Multi-node joint encryption data transmission method, equipment and storage medium
JP6081386B2 (en) Information sharing apparatus, information sharing method, and information sharing program
CN111970236B (en) Cross-network data transmission method and device
CN107872315B (en) Data processing method and intelligent terminal
CN110602234B (en) Block chain network node management method, device, equipment and storage medium
CN113922972B (en) Data forwarding method and device based on MD5 identification code
CN113259393B (en) Data forwarding method and device based on multi-level nodes
CN105592083A (en) Method and device for terminal to have access to server by using token
CN106537962B (en) Wireless network configuration, access and access method, device and equipment
CN113491092A (en) Method for anonymizing client MAC address for cloud report
CN111865557A (en) Check code generation method and device
CN114338527B (en) IPv6 active identifier processing method and system
CN107800758B (en) Wind control data processing method, device and system
CN109327864A (en) Flow processing method, device, equipment and storage medium
CN115333753A (en) Internet protocol address generation method and device, storage medium and electronic equipment
CN114567678A (en) Resource calling method and device of cloud security service and electronic equipment
CN111107142B (en) Service access method and device
US9374474B1 (en) System, method, and computer program for detecting duplicated telecommunications events in a consumer telecommunications network
CN115242389B (en) Data confusion transmission method and system based on multi-level node network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant