Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Link establishing method of hidden service

A link establishment and link technology, which is applied in the field of link establishment of hidden services, can solve the problems of complex link structure and no obvious improvement in communication efficiency, and achieve the effects of reducing transmission delay, reducing the number of times, and reducing the burden.

Active Publication Date: 2018-11-20
GUANGDONG UNIV OF TECH
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method is more resistant to traffic analysis than the original hidden service and improves the security of communication. However, the link structure is more complex and the communication efficiency has not been significantly improved.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Link establishing method of hidden service

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The present invention will be further described below in conjunction with specific embodiment:

[0031] A hidden service link establishment method described in this embodiment: including hidden service deployment and link establishment, so as to connect the client and the server;

[0032] Among them, the specific steps of hidden service deployment are as follows:

[0033] SA-1. The server generates a pair of keys for the hidden service;

[0034] SA-2. Select 3 nodes as introduction nodes;

[0035] SA-3. The server establishes a connection with the introducing node, and sends a relay establishment instruction to each node;

[0036] SA-4. After the introduction node verification is successful, send the corresponding command to the server;

[0037] SA-5. The server generates a hidden service descriptor for the hidden service, including the public key corresponding to the hidden service, the secret id part, the release time, the protocol version, the list of introducing ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a link establishing method of a hidden service. The length of an established link is half of the original length, and the shorter link can be used to reduce time delay of transmission and the encryption-decryption frequency and alleviate the burden of a client and a server. An original single outlet node is changed into multiple outlet nodes, after that data sent by the client reaches a repeating node, the repeating node sends the data to the outlet node selected randomly, and the outlet node sends the data to the server. Neither the client nor the server knows complete link information, and the link is safer. The outlet node is changed into a set of nodes, the outlet nodes share the flow, data that needs to be transmitted by each node is less, congestion is less likely to occur, the data transmission speed is improved, and link response time is shorter.

Description

technical field [0001] The invention relates to the research field of onion routing system. In order to increase the transmission rate of the link and better protect the anonymity of both communication parties, a link establishment method of hidden service is proposed. The shorter link improves the transmission rate, and the link The establishment time is also shorter, fewer forwarding routes also reduce the number of encryption and decryption, and multiple paths reduce the possibility of traffic analysis, which has higher security. . Background technique [0002] Deep Web (Liu Wei, Meng Xiaofeng, Meng Weiyi. A Review of Deep Web Data Integration Research [J]. Journal of Computer Science, 2007 (09): 1475-1489) refers to the pages that cannot be found by standard search engines on the Internet, which contains The amount of information is huge. Currently, the most widely used anonymous communication system in the deep network is the onion routing system Tor (The onion router)...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0421H04L63/18
Inventor 柳毅梁嘉伟凌捷
Owner GUANGDONG UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products