WO2015156612A1 - Procédé et dispositif pour surveiller et bloquer un paquet - Google Patents

Procédé et dispositif pour surveiller et bloquer un paquet Download PDF

Info

Publication number
WO2015156612A1
WO2015156612A1 PCT/KR2015/003553 KR2015003553W WO2015156612A1 WO 2015156612 A1 WO2015156612 A1 WO 2015156612A1 KR 2015003553 W KR2015003553 W KR 2015003553W WO 2015156612 A1 WO2015156612 A1 WO 2015156612A1
Authority
WO
WIPO (PCT)
Prior art keywords
packet
blocking
user terminal
proxy server
received
Prior art date
Application number
PCT/KR2015/003553
Other languages
English (en)
Korean (ko)
Inventor
박형배
강경태
Original Assignee
플러스기술 주식회사
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 플러스기술 주식회사 filed Critical 플러스기술 주식회사
Publication of WO2015156612A1 publication Critical patent/WO2015156612A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0281Proxies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/22Arrangements for preventing the taking of data from a data transmission channel without authorisation
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks

Definitions

  • the present invention relates to a packet monitoring and blocking method and apparatus, and more particularly, to a packet monitoring and blocking method and apparatus for blocking harmful substances or information leakage.
  • STMP Simple Mail Transfer Protocol
  • web browser a web browser
  • instant messengers Such an environment makes it easy to exchange conversations or files between users of a smartphone, and to exchange various data by various additional applications provided through the smartphone.
  • STMP Simple Mail Transfer Protocol
  • Such an environment makes it easy to exchange conversations or files between users of a smartphone, and to exchange various data by various additional applications provided through the smartphone.
  • STMP Simple Mail Transfer Protocol
  • there is a side effect that such use can easily leak personal or confidential information of individuals, companies or organizations.
  • a firewall based on a network driver and block access to a predetermined server (e.g., a malicious site, a messenger server, etc.) to prevent information leakage or Blocking access to harmful sites.
  • a predetermined server e.g., a malicious site, a messenger server, etc.
  • Korean Patent Publication No. 10-1556658 discloses a content of blocking such information leakage and access to harmful sites by incorporating such a network firewall system into a portable terminal.
  • the prior document blocks the transmission and reception of packets for applications or the web except for a pre-registered application, access to an unharmful site among pre-registered applications or the web may be blocked, and a packet related to a pre-registered application may be blocked. Even if the packet contains harmful content, there is a problem that can not be blocked.
  • the background art described above is technical information that the inventors possess for the derivation of the present invention or acquired in the derivation process of the present invention, and is not necessarily a publicly known technique disclosed to the general public before the application of the present invention. .
  • an embodiment of the present invention is to provide a proxy server in the portable terminal, to monitor the packets transmitted and received from the portable terminal to prevent harmful information access or confidential information leakage have.
  • the packet monitoring and blocking method may further include inputting identification information of the user terminal to proxy server setting information set in an operating system of the user terminal before receiving the packet.
  • the inputting of the identification information of the user terminal into the proxy server setting information set in the operating system of the user terminal may include inputting identification information of the user terminal input by the user into the proxy server setting information of the user terminal,
  • the packet management application automatically inputs identification information of the user terminal into proxy server setting information of the user terminal.
  • the proxy server setting information of the user terminal includes an IP address and a port number.
  • the inputting of the identification information of the user terminal into the proxy server setting information set in the operating system of the user terminal may include inputting an IP address of the proxy server setting information as an IP address of the user terminal and setting the proxy server. Entering a port number of information as a port number of the packet management application.
  • the preset blocking target may include at least one of a packet including host information preset in a transmission address or a reception address, and a packet associated with personal information stored in the user terminal, preset confidential information, and a preset file or folder or application. It includes.
  • blocking the transmission or reception of the received packet between the user terminal and a network may determine whether the received packet is the preset blocking target. Making; And blocking the transmission or reception of the received packet when the received packet meets a preset blocking target.
  • the determining of whether the received packet is the block object may be performed by parsing a header or payload of the transmitted / received packet to obtain information about a transmission address, a reception address, or data transmitted through the packet. Include steps to identify.
  • blocking the transmission or reception of the received packet may include transmitting or receiving the packet when the received packet meets a preset blocking target. Providing a query to the user as to whether to block; And proceeding or blocking the transmission or reception of the packet according to the user's answer to the blocking.
  • blocking the transmission or reception of the received packet between the user terminal and the network may block transmission or reception of the received packet.
  • the user terminal is a portable wireless communication terminal.
  • the packet monitoring and blocking apparatus comprising a user terminal with a packet management application is installed and a proxy server implemented through the packet management application, the proxy server, the user terminal and the network
  • a packet receiving unit for receiving a packet transmitted or received therebetween;
  • a packet blocking unit for blocking transmission or reception of the received packet between the user terminal and the network when the received packet meets a preset blocking target.
  • the apparatus for monitoring and blocking a packet further includes a proxy server setting information input unit configured to input identification information of the user terminal to proxy server setting information set in an operating system of the user terminal before receiving the packet.
  • the proxy server setting information input unit may input identification information of the user terminal input by the user to the proxy server setting information of the user terminal, or the packet management application may automatically input the proxy server setting information of the user terminal. Input identification information of the user terminal.
  • the proxy server setting information of the user terminal includes an IP address and a port number.
  • the proxy server setting information input unit may input an IP address of the proxy server setting information as an IP address of the user terminal, and input a port number of the proxy server setting information as a port number of the packet management application.
  • the preset blocking target may include at least one of a packet including host information preset in a transmission address or a reception address, and a packet associated with personal information stored in the user terminal, preset confidential information, and a preset file or folder or application. It includes.
  • the packet blocking unit parses the header or payload of the packet to be transmitted and received, and grasps the transmission address, the reception address of the packet, or the information of the data transmitted through the packet.
  • the packet blocking unit may provide a user with an inquiry about whether to block transmission or reception of the packet when the received packet meets a predetermined blocking target, and according to the user's answer to the blocking. Proceed or block the transmission or reception of the packet.
  • the packet blocking unit may block transmission or reception of the received packet to provide an error page to the user terminal or provide a blocking page for notifying access blocking of a page requested by the user.
  • the device may be a portable wireless communication terminal.
  • an embodiment of the present invention can achieve the effect of disposing a proxy server on a portable terminal by executing a packet management application.
  • the proxy server on the portable terminal. Accordingly, it is possible to block transmission of packets related to harmful information or packets related to personal information or confidential information from the portable terminal of the user.
  • FIG. 1 is a block diagram of a packet monitoring and blocking device and peripheral devices according to an embodiment of the present invention.
  • FIG. 2 is a conceptual diagram illustrating an operation principle of a packet monitoring and blocking device according to an embodiment of the present invention.
  • FIG. 3 is a block diagram illustrating a packet monitoring and blocking apparatus according to an embodiment of the present invention.
  • FIG. 4 is a flowchart illustrating a packet monitoring and blocking method according to an embodiment of the present invention.
  • FIG. 1 is a block diagram of a packet monitoring and blocking apparatus and a third server according to an embodiment of the present invention.
  • the packet monitoring and blocking device 110 and the third server 200 may communicate with each other via the network N.
  • the network N may include a local area network (LAN), a wide area network (WAN), a value added network (VAN), a personal local area network (PAN), and a mobile communication network (PAN). It can be implemented in all kinds of wired / wireless networks such as mobile radio communication network (Wibro), wireless broadband Internet (Wibro), mobile WiMAX, high speed downlink packet access (HSDPA), or satellite communication network.
  • Wibro mobile radio communication network
  • Wibro wireless broadband Internet
  • HSDPA high speed downlink packet access
  • the packet monitoring and blocking apparatus 110 may be a user terminal 110 in which a packet management application is installed, and may include a proxy server 150. (Hereinafter, the packet monitoring and blocking device and the user terminal may be referred to as referring to the same object.)
  • the user terminal 110 monitors the packets transmitted and received into the terminal 110, so that the packets are subject to a preset blocking policy. Depending on the match, the packet can be blocked or continuously sent and received.
  • the user terminal 110 may be implemented as a computer, a portable terminal, or a television that can be connected to a remote server through a network (N) or connectable to other terminals and servers.
  • the computer includes, for example, a laptop, desktop, laptop, etc., which is equipped with a web browser
  • the portable terminal is, for example, a wireless communication device that ensures portability and mobility.
  • the television may include an Internet Protocol Television (IPTV), an Internet Television (Internet Television), a terrestrial TV, a cable TV, or the like.
  • IPTV Internet Protocol Television
  • Internet Television Internet Television
  • the proxy server 150 is a computer that is included in the user terminal 110 and relays communication between the user terminal 110 and the third server 200, and monitors all packets transmitted or received by the user terminal 110. Can be.
  • the proxy server 150 and the user terminal 110 may have a relationship implemented in software in one hardware through a packet management application. Also, in general, the proxy server 150 stores the contents requested by the proxy server 150 using a cache, and does not access the third server 200 for a request for information in the cache. By directly transmitting the stored information to the user terminal 110, it may serve to reduce traffic with the outside. In addition, the proxy server 150 may act as a security obstacle to prevent other users from accessing information located in the user terminal 110.
  • the user terminal 110 arranges the proxy server 150 therein and transmits a packet transmitted from the third server 200 or another terminal to the user terminal 110, or the user.
  • the terminal 110 may monitor the packet transmitted to the outside, and if the transmission data associated with the packet is not suitable, it may block the transmission and reception of the packet between the user terminal 110 and the network (N).
  • the third server 200 is a computer that communicates with the user terminal 110 or another server (not shown) through a network.
  • the third server 200 may provide various contents according to each purpose, and transmit the requested information at the request of the user terminal 110.
  • the third server 200 may be various servers such as a web server, a mail server, an application server, and an SNS server, and the type of the third server 200 is not particularly limited.
  • the third server 200 may receive data from the user terminal 110, for example, may communicate with a web browser or other application programs or malicious codes installed in the user terminal 110.
  • the user terminal 110 may set proxy server 150 setting information of the user terminal as identification information of the user terminal 110 through a packet management application installed in the terminal 110.
  • the proxy server 150 is arranged in the user terminal 110, so that the proxy server 150 may monitor packets transmitted and received between the user terminal 110 and the network (N).
  • the criteria for blocking the monitored packet may be set when there is a risk of leakage of harmful information, confidential information and personal information.
  • harmful information inflow and confidential information leakage of the user terminal 110 are blocked, information that may be introduced or transmitted from the user terminal 110 may exist only general information, not harmful or confidential information.
  • when personal information is leaked, when accessing harmful sites such as pornography or gambling sites, when small payments are made without the user's knowledge, etc. may be blocked in advance.
  • the proxy server 150 may be implemented by a packet management application installed in the user terminal 110. That is, the software may be implemented as a packet management application, and the hardware may be implemented as the user terminal 110.
  • the proxy server 150 may include a proxy server setting information input unit 151, a packet receiver 153, a packet blocker 155, and a packet transmitter 157.
  • the proxy server setting information input unit 110 inputs identification information of the user terminal 110 to the proxy server setting information of the user terminal.
  • the proxy server setting information of the user terminal 110 may include an IP address and a port number. That is, the proxy server setting information input unit 110 sets the IP address of the proxy server setting information of the user terminal 110 as the IP address of the user terminal 110 and the port number of the proxy server setting information of the user terminal 110. May be set to a port number of a packet management application installed in the user terminal 110.
  • the proxy server setting information input of the user terminal 110 may be made manually or automatically. For example, the user may directly input the proxy server setting information of the user terminal 110, the proxy server setting information of the user terminal 110 is automatically identified by the packet management application as the identification information of the user terminal 110. It may be set. Accordingly, the proxy server 150 may be disposed in the user terminal 110. The proxy server 150 may monitor packets transmitted or received between the user terminal 110 and the network N.
  • the packet receiver 153 receives a packet transmitted and received between the user terminal 110 and the third server 200 through the network N and transmits the packet to the packet blocker 155.
  • the packet receiver 153 may receive a packet that another application or program in the user terminal 110 transmits to another terminal or a third server, and the third server 200 may transmit the packet in the user terminal 110.
  • the packet receiver 153 may receive a packet that another application or program in the user terminal 110 transmits to another terminal or a third server, and the third server 200 may transmit the packet in the user terminal 110.
  • the packet blocking unit 155 determines whether the received packet corresponds to a preset blocking policy, and blocks the transmission of the received packet when the received packet corresponds to a prohibited packet specified in the blocking policy.
  • the packet blocking unit 155 may refer to a header and a payload of the packet to determine packet information.
  • the header of the packet indicates packet identification information as supplementary data located at the beginning of the data block to be stored or transmitted.
  • the header of the packet includes a transmission / reception address for transmitting the packet and a port number of the transmission / reception address.
  • the payload of the packet means a portion of the data packet except for the header portion, that is, a portion representing data actual information.
  • the packet blocking unit 155 may refer to the header or payload of the packet to determine whether the packet is transmitted or received from a malicious site, whether the packet contains harmful information such as malicious code, or if the packet contains personal information (eg, For example, it may be determined whether contact information, name, address, e-mail, account number, card number, etc., or preset confidential information (for example, personal information of an individual, organization or company, or confidential documents) is included. .
  • the target of the packet blocked by the blocking policy stored in the packet blocking unit 155 is a packet of which a transmission / reception address is a predetermined site (for example, a lewd or gambling site), and the transmission / reception address is an IP address of a specific country abroad (for example, IP packets from North Korea, China, etc., packets containing personal information (for example, card numbers, financial institution account numbers, social security numbers, contacts, e-mails, etc.) or predetermined confidential information, and preset blocking files ( For example, packets containing harmful videos, images, and text files, malicious codes, packets containing malicious application files, automatic payments (e.g., payment through a mobile terminal, bank account or card number using Payment, etc.) may be at least one of the packets including the information.
  • a transmission / reception address is a predetermined site (for example, a lewd or gambling site)
  • IP address for example, IP packets from North Korea, China, etc., packets containing personal information (for example, card numbers,
  • the blocking policy may be set by a user or by a service provider.
  • the service provider may continuously update the blocking policy, and in order for the blocking policy to be applied to a preset blocking target, the packet management application (or proxy server) in the user terminal 110 may periodically or continuously perform a service provider server ( Communication may be performed).
  • the packet blocking unit 155 blocks the transmission of the packet when the packet transmitted from the application or program in the user terminal 110 onto the network N conforms to the blocking policy, and blocks the network from the user terminal 110.
  • the packet received from N) may block the packet reception to the destination port in the user terminal 110 conforming to the blocking policy.
  • the packet blocking unit 155 may block the packet by dropping the packet or block the packet and provide the blocking page to the user terminal. For example, if a packet received by the web browser of the user terminal 110 is blocked, if the packet is dropped, a page such as “page not found” may be displayed on the user terminal 110, and the blocking page. If the user terminal 110 may display a message such as "Page access is blocked".
  • the packet blocking unit 155 asks the user whether to block the transmission and reception packet, and according to the user input Packets can be delivered to their destinations with or without blocking packets. For example, blocking an automatic payment packet can prevent a third party from stealing the funds with the user's identification, but if the user blocks the automatic payment for their own needs, It can cause great inconvenience. Accordingly, when the packet blocking unit 155 transmits and receives an automatic payment packet, a message for inquiring whether the automatic payment request has been generated through the display unit (not shown) of the packet monitoring and blocking device 110 is to be continued. Can be provided.
  • the user will enter the payment progress if the payment requested by the user, and will enter the payment block if the payment is requested by an unauthorized party.
  • the packet transmitter 157 transmits the packet to the corresponding destination.
  • the destination of the packet received from the application or the application in the user terminal 110 may be a third server ( 200 or another terminal (not shown), each may be transmitted to the corresponding destination.
  • the packet monitoring and blocking function of the proxy server by the packet management application is applied to the entire application program running on the operating system of the user terminal 110 or for each individual application program belonging to the operating system below May apply.
  • the packet management application is installed and executed in the user terminal 110 (S110).
  • the packet management application can be downloaded and installed from an app market store such as the App Store or Google Play Store.
  • the identification information of the user terminal is input to the proxy server setting information of the user terminal 110, such that the proxy server 150 may be implemented in the user terminal 110 (S120).
  • the proxy server setting information to be set here is composed of an IP address and a port number. As the IP address and the port number of the proxy server setting information are designated as the IP address and the port number of the user terminal 110, the proxy server 150 is disposed in the terminal, and on the network N in the user terminal 110. You can monitor packets sent or received by the network.
  • each application installed in the user terminal 110 is set such that other applications cannot monitor the state or content of packets exchanged with the third server 200.
  • the operating system installed in the mobile terminal is set so that packet monitoring and tracking between applications are not allowed.
  • the proxy server 150 is a server that relays the transmission and reception of packets between the third server 200 and the user terminal 110, it is irrespective of which application of the user terminal 110 the transmission and reception address to which the packet is transmitted. In addition, all packets transmitted and received from the user terminal 110 can be monitored.
  • a function of blocking packet transmission and reception such as a network firewall
  • a function is not easy to apply, and the method of the present invention borrowing the function of the proxy server 150 is more simple.
  • Proxy server 150 receives a packet transmitted or received between the user terminal 110 and the network (N) (S130). That is, the proxy server 150 may receive a packet transmitted from an application or application within the user terminal 110 to the network N and a packet transmitted from the network N to an application or application within the user terminal 110. Can be.
  • the proxy server 150 determines whether the received packet conforms to the blocking policy (S140).
  • the proxy server 150 may determine whether the blocking policy is matched by referring to the header or the payload of the packet.
  • the blocking policy is set to block the transmission of packets indicating leakage, harmful or prohibited information such as personal information and confidential information, and the blocking policy is set by the service provider or the user of the user terminal 110. Can be.
  • the packet may be blocked in at least one of two ways.
  • One way to block the packet is to block transmission and reception of the packet, such as dropping the corresponding packet (S151).
  • an error page such as "page not found” may be output to the user terminal 110.
  • Another method is to block the packet and provide the blocking page to the user terminal 110 (S152). That is, by blocking the packet sent to or received from the user terminal 110, and by sending a blocking page, such as "access blocked" to the user terminal 110, the user by the blocking policy You can tell that the connection is blocked.
  • the proxy server 150 does not block the transmission and reception of the packet, and the packet is transmitted in the original transmission path of the packet. It transmits (S153).
  • the packet monitoring and blocking method and apparatus are indiscriminately leaking personal information, and malicious codes or applications are installed in the terminal without the user's knowledge, harmful information or spam information. May provide a solution to the phenomena transmitted to the terminal regardless of the user's consent.
  • one embodiment of the present invention can perform the above functions simply by installing a packet management application, which has a great advantage in that it has greater utility and ease of implementation for a mobile terminal.
  • the packet monitoring and blocking method according to the embodiment described with reference to FIG. 4 may also be implemented in the form of a recording medium including instructions executable by a computer, such as a program module executed by the computer.
  • Computer readable media can be any available media that can be accessed by a computer and includes both volatile and nonvolatile media, removable and non-removable media.
  • computer readable media may include both computer storage media and communication media.
  • Computer storage media includes both volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer readable instructions, data structures, program modules or other data.
  • Communication media typically includes computer readable instructions, data structures, program modules, or other data in a modulated data signal such as a carrier wave, or other transmission mechanism, and includes any information delivery media.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

Selon un mode de réalisation de la présente invention, un serveur mandataire peut être installé dans un terminal portable par exécution d'une application de gestion de paquets. En outre, grâce à l'installation d'un serveur mandataire dans un terminal portable selon un mode de réalisation de l'invention, tous les paquets qui sont envoyés au terminal portable ou reçus de celui-ci peuvent être surveillés. Ainsi, l'émission ou la réception d'un paquet relatif à des informations préjudiciables ou d'un paquet relatif à des informations personnelles ou confidentielles vers ou en provenance du terminal portable d'un utilisateur peut être bloquée.
PCT/KR2015/003553 2014-04-09 2015-04-09 Procédé et dispositif pour surveiller et bloquer un paquet WO2015156612A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
KR10-2014-0042346 2014-04-09
KR1020140042346A KR101523253B1 (ko) 2014-04-09 2014-04-09 패킷 감시 및 차단 방법과 장치

Publications (1)

Publication Number Publication Date
WO2015156612A1 true WO2015156612A1 (fr) 2015-10-15

Family

ID=53395582

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2015/003553 WO2015156612A1 (fr) 2014-04-09 2015-04-09 Procédé et dispositif pour surveiller et bloquer un paquet

Country Status (2)

Country Link
KR (1) KR101523253B1 (fr)
WO (1) WO2015156612A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102263755B1 (ko) * 2019-10-16 2021-06-11 (주)소만사 엔드포인트의 트래픽에 대한 포워딩 시스템 및 방법

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080102646A (ko) * 2007-05-21 2008-11-26 삼성전자주식회사 이동통신 시스템에서 프록시 이동 인터넷 프로토콜을이용한 단말의 이동성 관리 방법 및 시스템
KR101033510B1 (ko) * 2008-11-17 2011-05-09 (주)소만사 메신저 정보유출 제어방법 및 그를 이용한 네트워크 콘텐츠보안시스템
KR20120012229A (ko) * 2010-07-30 2012-02-09 에스케이텔레콤 주식회사 불필요한 패킷 송수신 차단 장치 및 그 방법
KR20140021773A (ko) * 2012-08-10 2014-02-20 주식회사 아이디어웨어 패킷 차단에 대응하는 애플리케이션 패킷 패턴 검출장치 및 방법과 기록매체

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20080102646A (ko) * 2007-05-21 2008-11-26 삼성전자주식회사 이동통신 시스템에서 프록시 이동 인터넷 프로토콜을이용한 단말의 이동성 관리 방법 및 시스템
KR101033510B1 (ko) * 2008-11-17 2011-05-09 (주)소만사 메신저 정보유출 제어방법 및 그를 이용한 네트워크 콘텐츠보안시스템
KR20120012229A (ko) * 2010-07-30 2012-02-09 에스케이텔레콤 주식회사 불필요한 패킷 송수신 차단 장치 및 그 방법
KR20140021773A (ko) * 2012-08-10 2014-02-20 주식회사 아이디어웨어 패킷 차단에 대응하는 애플리케이션 패킷 패턴 검출장치 및 방법과 기록매체

Also Published As

Publication number Publication date
KR101523253B1 (ko) 2015-05-27

Similar Documents

Publication Publication Date Title
EP2710776B1 (fr) Signalisation anonyme
US20070274329A1 (en) Connection support apparatus and gateway apparatus
WO2013008998A1 (fr) Appareil d'accès à un réseau local sans fil et son procédé de fonctionnement
CN105934960B (zh) 移动设备业务管理
US9876877B2 (en) Special handling of a landing page
US20140032493A1 (en) Method, apparatus and system for synchronizing contact information
CN106888184A (zh) 移动终端支付类应用程序安全支付方法及装置
US10326852B2 (en) Proxy for monitoring special handling of content within a service network
CN104025551A (zh) 安全的数据传输
EP1826969A1 (fr) Dispositif fournissant un service de connexion à un réseau
CN103916489B (zh) 一种单域名多ip的域名解析方法及系统
KR20100059344A (ko) 이동단말과 인터넷전화기 간의 데이터 동기화 방법 및 시스템
WO2015156612A1 (fr) Procédé et dispositif pour surveiller et bloquer un paquet
CN115603974A (zh) 一种网络安全防护方法、装置、设备及介质
EP1515513A1 (fr) Système et procédé de distribution de données en temps réel utilisant UDP
CN103139205A (zh) 报文处理方法、装置及网络服务器
US8885481B2 (en) System and method for hybrid telecommunication
CN106888186A (zh) 移动终端支付类应用程序安全支付方法及装置
CA3017829C (fr) Numeros virtuels pour operations de renseignement
EP3253004B1 (fr) Dispositif de commande de communication, procédé de commande de communication et programme de commande de communication
KR101807695B1 (ko) 이동통신 라우터 장치 및 이를 포함하는 ip 공유 시스템
CN113691545B (zh) 路由的控制方法、装置、电子设备及计算机可读介质
US20210385256A1 (en) Secure lawful interception in network elements
Kim et al. A study on a new method of sending an e-mail with an attachment using a wireless terminal
CN105227427A (zh) 一种信息处理方法及装置、即时通讯服务器、融合网关

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15776663

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15776663

Country of ref document: EP

Kind code of ref document: A1