CN105681417B - Computer virus off-limit file Transmission system and method - Google Patents

Computer virus off-limit file Transmission system and method Download PDF

Info

Publication number
CN105681417B
CN105681417B CN201610027423.1A CN201610027423A CN105681417B CN 105681417 B CN105681417 B CN 105681417B CN 201610027423 A CN201610027423 A CN 201610027423A CN 105681417 B CN105681417 B CN 105681417B
Authority
CN
China
Prior art keywords
data
virus
ftp
module
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610027423.1A
Other languages
Chinese (zh)
Other versions
CN105681417A (en
Inventor
杨涛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Fanhan Digital Technology Co Ltd
Original Assignee
Chongqing Fanhan Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Fanhan Digital Technology Co Ltd filed Critical Chongqing Fanhan Digital Technology Co Ltd
Priority to CN201610027423.1A priority Critical patent/CN105681417B/en
Publication of CN105681417A publication Critical patent/CN105681417A/en
Application granted granted Critical
Publication of CN105681417B publication Critical patent/CN105681417B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/562Static detection
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • G06F21/568Computer malware detection or handling, e.g. anti-virus arrangements eliminating virus, restoring damaged files
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/145Countermeasures against malicious traffic the attack involving the propagation of malware through the network, e.g. viruses, trojans or worms

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Virology (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer And Data Communications (AREA)
  • Communication Control (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention discloses a kind of computer virus off-limit file Transmission system and methods, including:Receiving module, the data for receiving the transmission of FTP service end, and be stored in the memory of FTP local sides;Antivirus module, for received data to be carried out virus signature scanning in the memory of FTP local sides, according to virus characteristic library judge the data whether virus infection, the data of virus infection are abandoned or are retracted processing, it is state to be forwarded by the data markers of uninfecting virus, and the data address of uninfecting virus is dealt into queue to be sent;Transport protocol conversion module, for the transport protocol of the data of uninfecting virus to be converted to IB agreements by IP agreement;The data of uninfecting virus are stored in the security isolation region of FTP local sides by security isolation region module using rdma protocol.The present invention has many advantages, such as that high speed, stabilization, economy, attack tolerant are good.

Description

Computer virus off-limit file Transmission system and method
Technical field
The invention belongs to file transfer technologies, and in particular to a kind of computer virus off-limit file Transmission system and method.
Background technology
FTP is File Transfer Protocol(File Transfer Protocol)English abbreviation, on Internet The transmitted in both directions of file is controlled, i.e. user can be uploaded and be downloaded file to distance host by client program.
The advantages of being transmitted using ftp file be:No matter two computers for being connected into internet are how far apart, in no time File on one computer can be transmitted in another computer, text is replicated just as between the locally disk of meter grate machine Part sample is very convenient, simple.But there is also problems with using ftp file transmission:
(1)It need to realize that the storage of data forwards using local disk space, hard disk resources can be occupied when transmitting file;
(2)Document transmission method is to be based on TCP/IP agreements, therefore be easy to be attacked by internet worm, file transmission There are unsafe factors, and TCP is in contrast slow in transmission speed.In order to avoid Preventive Measures for Computer Virus Infection, one As anti-, virus investigation, antivirus software can be installed on computers, filter possible Virus entry for scanning, and to Virus into Row is removed, and this mode can play the role of good pre- anti-virus, but this gas defence removing toxic substances mode needs to occupy system CPU Resource, therefore the start-up course and the speed of service of computer can be delayed.
(3) data of transmission are directed to, traditional data safety isolation transmission mode is:
3a, local hard drive is received and is saved in, data file enters non-security isolated area;
3b, it kills virus to fixed disk file, enters secure isolation zone by the data of virus investigation;
3c, file is decomposed, distributes or be dumped to target location again.
The above this mode the problem is that:Data repeatedly swap between memory and disk file, system resource Expense is big;System data transmission speed is limited by R/W speed of hard disc;Hardware reliability that frequent disk read-write causes and steady Qualitative deficiency;And hardware investment is larger.IP agreement is a kind of widely used network addressing agreement, thus loophole technically It is easy to be utilized with weakness;The risk attacked when using the protocol technology is larger.
Therefore, it is necessary to develop a kind of new computer virus off-limit file Transmission system and method.
Invention content
The object of the present invention is to provide a kind of transmission of the computer virus off-limit file of high speed, stabilization, economy, attack resistance to be System and method.
Computer virus off-limit file Transmission system of the present invention, including:
Receiving module, the data for receiving the transmission of FTP service end, and be stored in the memory of FTP local sides;
Antivirus module, for received data to be carried out virus signature scanning in the memory of FTP local sides, according to Virus characteristic library judge the data whether virus infection, the data of virus infection are abandoned or are retracted processing, will not The data markers of virus infection are state to be forwarded, and the data address of uninfecting virus is dealt into queue to be sent, this is killed Malicious module is connect with receiving module;
Transport protocol conversion module, for the transport protocol of the data of uninfecting virus to be converted to IB associations by IP agreement View, the transport protocol conversion module are connect with antivirus module;
The data of uninfecting virus, the safety of FTP local sides is stored in using rdma protocol by security isolation region module In area of isolation, which connect with transport protocol conversion module.
Further, the receiving module includes at least one File Transfer Protocol port, for FTP local sides and FTP service end it Between pass through ICP/IP protocol establish connection and transmission data.
Further, further include notification module, for leading to when the data to virus infection are abandoned or retract processing Know user, which connect with antivirus module.
Virus off-limit file transmission method of the present invention, is passed using computer virus off-limit file of the present invention Defeated system, includes the following steps:
Step 1, FTP local sides receive the data that FTP service end is sent and are stored in the memory of FTP local sides;
The data of reception are carried out virus signature scanning by step 2, FTP local sides in memory, according to virus characteristic library Judge the data whether virus infection;If it is confirmed that data virus infection, then abandon the data or retract;Such as Fruit confirms the data uninfecting virus, then is state to be forwarded by the data markers, and by the data address of uninfecting virus It is dealt into queue to be sent;
The transport protocol of the data of uninfecting virus is converted to IB agreements by step 3 by IP agreement;
Step 4 is stored in using rdma protocol in the security isolation region module of FTP local sides.
Further, in the step 2, the data of reception are carried out virus signature scanning, root by FTP local sides in memory Judge whether the specific method of virus infection is the data according to virus characteristic library:
It is scanned for certain segment data or some data slot, the virus of scanned data and virus database is special Sign data are compareed, if the segment data or any one of this data slot and virus database virus characteristic phase Match, then judges the segment data or this data slot virus infection.
Further, in the step 1, before the data that FTP local sides receive transmitted by FTP service end, first interpretation FTP Whether the data transmitted by server-side are legal, if legal, receive the data and are labeled as waiting for virus investigation data, if illegal, The data are not received.
The present invention has the following advantages:
(1)Front end uses one or more FTP protocol port, is connected by the addresses TCP/IP for outer net or distal end And transmission data;FTP service realizes data storage forwarding without using local disk file, and carries out storage forwarding using memory, The efficiency of storage forwarding is substantially increased, the occupancy to hard disk resources is reduced;
(2)Virus in Unified Set is carried out in memory and is killed using viral antivirus processing, the multichannel file data of dispersion is concentrated Poison processing reduces the demand to node of killing virus;
(3)Using the translation-protocol of IP to IB, the external attack to IP address is shielded, reduces external network and passes through IP Attack storage modem meeting;
(4)(RDMA) agreement is accessed using remote direct memory, by data directly between the application memory of two systems It swaps, without carrying out data exchange by operating system memory, reduces and the pressure and resource of operating system are opened Pin;
(5)Frequent disk read-write is avoided by the way of data address mark in inside to the data of reception.
Description of the drawings
Fig. 1 is the principle of the present invention frame diagram;
Fig. 2 is the principle of the present invention figure;
Fig. 3 is the flow chart of the present invention;
Wherein:1, receiving module, 2, antivirus module, 3, transport protocol conversion module, 4, security isolation region module, 5, logical Know module.
Specific implementation mode
The invention will be further described below in conjunction with the accompanying drawings.
The computer virus off-limit file Transmission system as depicted in figs. 1 and 2, including receiving module 1, antivirus mould Block 2, transport protocol conversion module 3, security isolation region module 4 and notification module 5.
Receiving module 1 is used to receive the data of FTP service end transmission, and is stored in the memory of FTP local sides.
Antivirus module 2 is used to received data carrying out virus signature scanning in the memory of FTP local sides, according to Virus characteristic library judge the data whether virus infection, the data of virus infection are abandoned or are retracted processing, will not The data markers of virus infection are state to be forwarded, and the data address of uninfecting virus is dealt into queue to be sent, this is killed Malicious module 2 is connect with receiving module 1.
Transport protocol conversion module 3 is used to the transport protocol of the data of uninfecting virus being converted to IB associations by IP agreement View, the transport protocol conversion module 3 are connect with antivirus module 2.
The data of uninfecting virus are stored in the safety of FTP local sides using rdma protocol by security isolation region module 4 In area of isolation, which connect with transport protocol conversion module 3.
Notification module 5 when the data to virus infection are abandoned or retract processing for notifying user, the notice Module 5 is connect with antivirus module 2.
As shown in Fig. 2, the present invention uses one or more FTP protocol port, for FTP local sides and FTP service end Between pass through ICP/IP protocol establish connection and transmission data.FTP local sides realize data storage forwarding without using local disk, But storage forwarding is carried out using memory, the efficiency of storage forwarding is substantially increased, the occupancy to hard disk resources is reduced;Using collection The multichannel file data of middle virus antivirus processing, dispersion carries out viral antivirus processing in Unified Set in memory, reduces to killing The demand of malicious node;Using IP agreement to the conversion of IB agreements, the external attack to IP address is shielded, external network is reduced Modem meeting is stored by IP attack;(RDMA) agreement is accessed by data directly answering in two systems using remote direct memory It is swapped between memory, without carrying out data exchange by operating system memory, reduces the pressure to operating system Power and resource overhead.
As shown in Figures 2 and 3, viral off-limit file transmission method of the present invention, using calculating of the present invention Machine virus off-limit file Transmission system, includes the following steps:
Step 1, FTP local sides receive the data that FTP service end is sent and are stored in the memory of FTP local sides.
The data of reception are carried out virus signature scanning by step 2, FTP local sides in memory, according to virus characteristic library Judge the data whether virus infection;If it is confirmed that data virus infection, then abandon the data or retract, and Notify user;Then it is state to be forwarded by the data markers if it is confirmed that the data uninfecting virus, and by uninfecting virus Data address be dealt into queue to be sent.
The transport protocol of the data of uninfecting virus is converted to IB agreements by step 3 by IP agreement.
Step 4 is stored in using rdma protocol in the security isolation region module of FTP local sides.
In step 2 of the present invention, the data of reception are carried out virus signature scanning, root by FTP local sides in memory Judge whether the specific method of virus infection is the data according to virus characteristic library:
It is scanned for certain segment data or some data slot, by the virus characteristic of scan data and virus database Data are compareed, if the segment data or any one of this data slot and virus database virus characteristic phase Match, then judges the segment data or this data slot virus infection.
In step 1 of the present invention, before the data that FTP local sides receive transmitted by FTP service end, first interpretation FTP Whether the data transmitted by server-side are legal, if legal, receive the data and are labeled as waiting for virus investigation data, if illegal, The data are not received.
In the present invention:
IP address:So-called IP address is exactly an address of the host assignment to each connection on the internet; IPv4 Address is done using 32 signless integers;IPv6 is that it is used for substituting existing IPv4(Existing IP)A kind of new IP of agreement Agreement, address is done in the addresses IPv6 using 128 signless integers, due to being widely used by the technology, many technical leak quilts Exposure causes security risk.
InfiniBand (IB)It is the technology for low layer I/O communication, is the address access protocol of non-IP.It can To interconnect disk array, SANs, LANs, server and cluster server, external network can also be connected(Such as wide area Net, Virtual Private Network, internet).Infiniband architecture is that a kind of support mostly concurrently links " Convertion cable " technology, In this technology, the bandwidth of each link can reach 2.5 Gbps, this is a kind of data transmission technology of very fast high-bandwidth.
RDMA:RDMA(Remote Direct Memory Access)Technology full name remote direct data accesses, RDMA zero Duplication technology:Pass through NIC(Network interface card)Directly with application memory mutual data transmission, avoid in application memory and kernel Replicate data needs the bypass of kernel memories to make to call and can order to NIC transmissions using without executing kernel memory between depositing It enables, reduces the number of the environment changing between kernel memory headroom and user's space when handling network transmission stream.RDMA passes through Network moves quickly into data the memory block of the directly incoming computer of data in remote system stored device from a system, Without having any impact to operating system, it eliminates external memory and replicates and data exchange operation, be it is a kind of completely by Hardware executes the working method that I/O is exchanged, and data exchange is without CPU in this fashion, and directly in memory and I/O device Between carry out.
Using DMA (direct memory access) mode, the purpose is to reduce the expense of CPU when high-volume data transmission to use Special DMA controllers (DMAC) generate memory access address and controlling memory access process advantages has operation to be realized by hardware circuit, pass Defeated speed is fast.
CPU is not intervened substantially, only initialization and at the end of participate in, CPU and peripheral hardware concurrent working are efficient.
The course of work of RDMA is as follows:
(1) when an application execution RDMA reads or writes request, any data duplication is not executed and is not being needed in any Under conditions of core memory participates in, RDMA requests are sent to local NIC (network interface card) from operation application in the user space.
(2) NIC reads the content of buffering, and passes through transmission of network to long-range NIC.
(3) it has been asked comprising target virtual address, memory key and data itself in the RDMA information of transmission over networks At can both handle in the user space completely and (complete to arrange by polling user grade), or in application sleep always to asking Asking to handle .RDMA by kernel memory in the case of completing and operate makes to apply and can be read from the memory of a remote application Data write data to this memory.
(4) target NIC confirms memory key, directly writes data into application cache, the remote dummy for operation Memory address is included in RDMA information.

Claims (6)

1. a kind of computer virus off-limit file Transmission system, which is characterized in that including:
Receiving module(1), the data for receiving the transmission of FTP service end, and be stored in the memory of FTP local sides;
Antivirus module(2), for received data to be carried out virus signature scanning in the memory of FTP local sides, according to Virus characteristic library judge the data whether virus infection, the data of virus infection are abandoned or are retracted processing, will not The data markers of virus infection are state to be forwarded, and the data address of uninfecting virus is dealt into queue to be sent, this is killed Malicious module(2)With receiving module(1)Connection;
Transport protocol conversion module(3), for the transport protocol of the data of uninfecting virus to be converted to IB agreements by IP agreement, The transport protocol conversion module(3)With antivirus module(2)Connection;
Security isolation region module(4), using rdma protocol by the data of uninfecting virus be stored in FTP local sides safety every From in region, the security isolation region module(4)With transport protocol conversion module(3)Connection.
2. computer virus off-limit file Transmission system according to claim 1, it is characterised in that:The receiving module (1)Including at least one File Transfer Protocol port, connected for being established by ICP/IP protocol between FTP local sides and FTP service end And transmission data.
3. computer virus off-limit file Transmission system according to claim 1 or 2, it is characterised in that:It further include notice Module(5), for notifying user when the data to virus infection are abandoned or retract processing, the notification module and antivirus Module(2)Connection.
4. a kind of virus off-limit file transmission method, it is characterised in that:Using the computer as described in claims 1 to 3 is any Viral off-limit file Transmission system, includes the following steps:
Step 1, FTP local sides receive the data that FTP service end is sent and are stored in the memory of FTP local sides;
The data of reception are carried out virus signature scanning by step 2, FTP local sides in memory, are judged according to virus characteristic library The data whether virus infection;If it is confirmed that data virus infection, then abandon the data or retract;If really Recognize the data uninfecting virus, is then state to be forwarded by the data markers, and the data address of uninfecting virus is dealt into In queue to be sent;
The transport protocol of the data of uninfecting virus is converted to IB agreements by step 3 by IP agreement;
Step 4 is stored in using rdma protocol in the security isolation region module of FTP local sides.
5. virus off-limit file transmission method according to claim 4, it is characterised in that:In the step 2, FTP is local The data of reception are carried out virus signature scanning by end in memory, judge whether the data infect disease according to virus characteristic library Poison specific method be:
It is scanned for certain segment data or some data slot, by the virus characteristic data of scan data and virus database It is compareed, if the segment data or any one of this data slot and virus database virus characteristic match, Judge the segment data or this data slot virus infection.
6. virus off-limit file transmission method according to claim 4 or 5, it is characterised in that:In the step 1, in FTP Before local side receives the data transmitted by FTP service end, whether the data transmitted by first interpretation FTP service end are legal, if closing Method then receives the data and labeled as virus investigation data are waited for, if illegal, does not receive the data.
CN201610027423.1A 2016-01-15 2016-01-15 Computer virus off-limit file Transmission system and method Active CN105681417B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610027423.1A CN105681417B (en) 2016-01-15 2016-01-15 Computer virus off-limit file Transmission system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610027423.1A CN105681417B (en) 2016-01-15 2016-01-15 Computer virus off-limit file Transmission system and method

Publications (2)

Publication Number Publication Date
CN105681417A CN105681417A (en) 2016-06-15
CN105681417B true CN105681417B (en) 2018-08-14

Family

ID=56300987

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610027423.1A Active CN105681417B (en) 2016-01-15 2016-01-15 Computer virus off-limit file Transmission system and method

Country Status (1)

Country Link
CN (1) CN105681417B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101382984A (en) * 2007-09-05 2009-03-11 江启煜 Method for scanning and detecting generalized unknown virus
CN101431521A (en) * 2008-11-26 2009-05-13 北京网康科技有限公司 Anti-Trojan network security system and method
CN101599922A (en) * 2008-06-02 2009-12-09 北京华凯兴网络科技有限公司 Application-layer protocol virus protective gateway
CN101610264A (en) * 2009-07-24 2009-12-23 深圳市永达电子股份有限公司 The management method of a kind of firewall system, safety service platform and firewall system
EP1988473B1 (en) * 2007-05-04 2012-02-08 Helge Hofmeister A server with a core using a virtual file system and a method for securely redirecting a persistent storage device operation to a middleware infrastructure
CN104022998A (en) * 2013-03-01 2014-09-03 北京瑞星信息技术有限公司 Network transmission data virus detection processing method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1988473B1 (en) * 2007-05-04 2012-02-08 Helge Hofmeister A server with a core using a virtual file system and a method for securely redirecting a persistent storage device operation to a middleware infrastructure
CN101382984A (en) * 2007-09-05 2009-03-11 江启煜 Method for scanning and detecting generalized unknown virus
CN101599922A (en) * 2008-06-02 2009-12-09 北京华凯兴网络科技有限公司 Application-layer protocol virus protective gateway
CN101431521A (en) * 2008-11-26 2009-05-13 北京网康科技有限公司 Anti-Trojan network security system and method
CN101610264A (en) * 2009-07-24 2009-12-23 深圳市永达电子股份有限公司 The management method of a kind of firewall system, safety service platform and firewall system
CN104022998A (en) * 2013-03-01 2014-09-03 北京瑞星信息技术有限公司 Network transmission data virus detection processing method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
网络单向隔离控制***的设计与实现;唐晋;《中国优秀硕士学位论文全文数据库(电子期刊)信息科技辑》;20130531;1-76 *

Also Published As

Publication number Publication date
CN105681417A (en) 2016-06-15

Similar Documents

Publication Publication Date Title
US8005022B2 (en) Host operating system bypass for packets destined for a virtual machine
US9794282B1 (en) Server with queuing layer mechanism for changing treatment of client connections
EP1565826B1 (en) Network interface and protocol supporting mappings of virtual memory locations at different processing devices
CN111756712B (en) Method for forging IP address and preventing attack based on virtual network equipment
EP2175603A1 (en) Dynamic access control policy with port restrictions for a network security appliance
US9985977B2 (en) Direct cache access for network input/output devices
Ng et al. A Waypoint Service Approach to Connect Heterogeneous Internet Address Spaces.
CN110505244A (en) Long-range tunnel access technique gateway and server
KR20120121668A (en) High Performance System and Method for Blocking Harmful Sites Access on the basis of Network
CN105681417B (en) Computer virus off-limit file Transmission system and method
Mansley Engineering a user-level TCP for the CLAN network
CN107257352B (en) DPDK-based URL authentication redirection system and method
US8555368B2 (en) Firewall filtering using network controller circuitry
CN114024731A (en) Message processing method and device
CN110581843B (en) Mimic Web gateway multi-application flow directional distribution method
US20060282508A1 (en) System and method of responding to a flood attack on a data processing system
Frey Zero-copy network communication: An applicability study of iWARP beyond micro benchmarks
Mireles et al. Securing an InfiniBand network and its effect on performance
CN113518066A (en) Scanning system for address proxy conversion and address conversion method
CN117714115A (en) Attack protection method, device, server and storage medium
CN115174243A (en) Malicious IP address blocking processing method, device, equipment and storage medium
CN115118459A (en) Method and equipment for realizing secure data exchange based on security card and isolation card heterogeneous
Ganger et al. Self-Securing Network Interfaces: What, Why and How (CMU-CS-02-144)
杨武 et al. Techniques of Building a Scalable, Efficient Intrusion Monitoring Architecture
Liang et al. Research of Security Router Technology on Internet Environment

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP02 Change in the address of a patent holder

Address after: 400039 No. 24-9, Keyuan Road, Jiulongpo District, Chongqing, 24-9

Patentee after: CHONGQING FANHAN DIGITAL TECHNOLOGY CO., LTD.

Address before: 400039 Chongqing City Nan'an District, Asia Pacific Road 9, Rong Chuang nine international 7 29-11

Patentee before: CHONGQING FANHAN DIGITAL TECHNOLOGY CO., LTD.

CP02 Change in the address of a patent holder