Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Long information pushing method and device in bypass environment

An information push and environment technology, applied in the field of information network, can solve deployment and other problems, and achieve the effect of saving physical resources and good confidentiality

Active Publication Date: 2019-09-06
WUHAN GREENET INFORMATION SERVICE
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] This push method is simple and has a high push success rate, but the disadvantage is that a content server needs to be deployed in the live network, and the IP address of this server will be included in the push information, thereby exposing it to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Long information pushing method and device in bypass environment
  • Long information pushing method and device in bypass environment
  • Long information pushing method and device in bypass environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0064] Embodiment 1 of the present invention provides a method for pushing long information in a bypass environment, and its system architecture is as follows figure 2 As shown, the client C and the real server S perform TCP interaction, and all the interactive messages can be received by the push server P, and the push server P is transparent to the client C and the real server S. In the embodiment of the present invention, the push server P selectively sends a packet to the user C or the real server S. When the push server P sends a packet to the user C, the source IP is the real server S. When the push server P sends a packet to the real server S, The source IP is user C; the interaction parties are user C and real server S. If two packets with the same TCP sequence number are received, the one received first shall prevail, and the one received later will be considered as duplicate information and discarded. Such as image 3 As shown, the methods include:

[0065] In ste...

Embodiment 2

[0085] Such as Figure 6 As shown, it is a schematic structural diagram of an apparatus for pushing long information in a bypass environment according to an embodiment of the present invention. The apparatus for pushing long information in a bypass environment in this embodiment includes one or more processors 21 and memory 22 . in, Figure 6 A processor 21 is taken as an example.

[0086] Processor 21 and memory 22 can be connected by bus or other means, Figure 6 Take connection via bus as an example.

[0087] Memory 22 is a non-volatile computer-readable storage medium as a method and device for pushing long information in a bypass environment, and can be used to store non-volatile software programs and non-volatile computer-executable programs, as in Embodiment 1 A method for pushing long messages in a bypass environment. The processor 21 runs the non-volatile software program and instructions stored in the memory 22, so as to execute the method of pushing long inform...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information networks, and provides a long information pushing method and device in a bypass environment. The method comprises the following steps: a push server receiving flow data interacted between a client and a real server; establishing a time delay table for pushing a server to all clients and / or to the real server; analyzing the connection state of the client and the real server to obtain the time delay from the real server to the client in each request; if the server is pushed to the client, delaying t1; and when the delay t1 is smaller than the delay t2 from the real server to the client, after the push server detects a request message sent by the client to the real server, the push server pushing a push message containing long information or long information fragments to the client according to the time difference between the delay t1 and the delay t2. According to the method, server physical resources and IP address resources can be saved, meanwhile, information irrelevant to the push content is hidden for the client side, and the confidentiality is better.

Description

[0001] 【Technical field】 [0002] The invention relates to the technical field of information network, in particular to a method and device for pushing long information in a bypass environment. [0003] 【Background technique】 [0004] Many of the various service systems of telecom operators are based on bypass traffic. Most of these systems are for offline analysis, such as traffic identification and statistics, content restoration and storage, etc. These services will not have any impact on the live network, and the real-time requirements are not high. In some systems, the business to be processed interacts with live network traffic, which has stricter requirements. For example, the flow control system requires accuracy and control granularity; the information push system requires real-time and concealment. [0005] The current typical use case for information push is the Internet information push system, and another is the file push system used by the security department. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08H04L12/26H04L29/06
CPCH04L67/14H04L43/0852H04L69/163H04L67/55
Inventor 程波
Owner WUHAN GREENET INFORMATION SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products