Tracing method of Tor network
A network and data packet technology, applied in the darknet field, can solve the problems of network crime investigation and tracking difficulties, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0012] In order to make the purpose, content, and advantages of the present invention clearer, the specific implementation manners of the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.
[0013] Figure 1a Shown is the Tor Control Element packet format diagram, Figure 1b Shown is a schematic diagram of the Tor forwarding element data packet format, such as Figure 1a as well as Figure 1b As shown, in the Tor network, the client needs to go through three onion routers to access the server (the English used on the official website is Onion Router), which are the entry node, intermediate node, and exit node, which can be called three hops. Six jumps. The client and the server establish an encrypted communication path after three or six hops, which can be called a Tor link (the English used on the official website is circuit). The data field part of the data packet transmitted on the Tor link is 512 byt...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com