A blacklist real time management method and device

A blacklist and management module technology, applied in the field of data communication, can solve the problems of low real-time performance and reduced communication system security, and achieve the effects of high real-time performance, reduced communication complexity, and stable performance

Inactive Publication Date: 2008-05-28
ZTE CORP
View PDF0 Cites 27 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The technical problem to be solved by the present invention is to provide a method and device for real-time blacklist management, which are used to overcome the defect of communication system security reduction caused by low real-time blacklist management of data communication products in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A blacklist real time management method and device
  • A blacklist real time management method and device
  • A blacklist real time management method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The technical solutions of the present invention will be further described in more detail in conjunction with the accompanying drawings and specific embodiments.

[0033] As shown in Figure 1, it is a schematic diagram of a network where intranet users access the Internet through a router with a firewall function. The hardware part in the networking relationship in the figure includes more than one host, a hub or switch, a router with firewall function, more than one ordinary router, 100 / 1000M interface boards and several twisted-pair cables. Wait.

[0034] In FIG. 1 , the intranet 10 includes but not limited to the following devices: host PC1, PC2, switch 30 and router R1 with firewall function.

[0035] The hosts PC1 and PC2 are connected to the interface 1 of the router R1 through the switch 30, and are connected to the external network 20 from the interface 2 of the router R1. The external network 20 is an external network, which may be the Internet.

[0036] The ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for real-time blacklist management and the device thereof, wherein, the method comprise the following steps: step one, a transmission module sends detected message information with attack signature to a blacklist management module, and discards the message; step two, the blacklist management module searches all the blacklist list items in the blacklist, deletes aged blacklist list items, and adds the information into the blacklist list items. The invention adopts a module optimization treatment mode, obtains technical and security progresses, and truly achieves the effect of the real-time blacklist management. No information interaction exists between the modules, therefore the designs in the modules are required to be compactor and more logical, thereby the real time and the stability of the blacklist management are better, and the security of a communication system is higher.

Description

technical field [0001] The invention relates to network security technology in the field of data communication, in particular to a method and device for real-time blacklist management. Background technique [0002] In communication products, the blacklist is a method of filtering packets based on the source IP address and other feature information. One of the most important features of the blacklist is that entries defined in it can be automatically added (dynamically generated) and deleted (timing aging), which is a function of most communication products. On the one hand, this function uses the management module to obtain the blacklist entry information that needs to be added, and then the management module transmits the information to the information module, and finally the information module adds processing; on the other hand, before the management module transmits information to the information module , first check the existing blacklist entries, and if any aged entrie...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/56G06F17/30
Inventor 孙勇
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products