Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system and equipment for controlling user upper wire

A device and user technology, applied in the field of network security, can solve the problems of low security, inability to access external networks, and illegal users cannot pass authentication, and achieve the effect of improving security.

Active Publication Date: 2009-05-20
RUIJIE NETWORKS CO LTD
View PDF0 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The firewall is used to isolate the internal network and the external network. Users access the external network through a proxy server, but identity verification is required. Only after the identity verification is passed can they access the external network. Then, even if an illegal user steals the IP address of a legitimate user, due to It does not know the legal user name and password. Illegal users cannot pass the authentication of the proxy server and naturally cannot access the external network.
This method cannot prevent IP address theft of the internal network
[0015] To sum up, the methods adopted in the prior art to prevent illegal users from using stolen and unauthorized addresses to access the network are less secure, which will affect the normal Internet access of legitimate users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and equipment for controlling user upper wire
  • Method, system and equipment for controlling user upper wire
  • Method, system and equipment for controlling user upper wire

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0099] The specific system architecture in this embodiment is as follows Figure 7A As shown, it includes a gateway device connected to the network, a switch device connected to the gateway device, a client terminal connected to the switch device, and an authentication management device located anywhere on the network. The switch device controls all connected clients, and all clients must pass the address authentication of the authentication management device before they can access the network. The specific process for the client to access the network is as follows:

[0100] Step 701: After the user configures the IP address on the client and inputs the authentication password information, the client sends an authentication request including the IP address, the MAC address of the client and the authentication password information to the switch device;

[0101] Step 702: The switch device receives the authentication request, and sends the authentication request to the authenticatio...

Embodiment 2

[0105] The specific system architecture in this embodiment is as follows Figure 7B As shown, it includes a gateway device connected to the network, a switch device connected to the gateway device, a client terminal connected to the switch device, other HUB or non-network managed switches connected to the switch device, and authentication management devices located anywhere on the network. The switch device controls all connected clients, and all clients must pass the address authentication of the authentication management device before they can access the network. Clients are also connected to other HUBs or non-network-managed switches. This method may cause IP conflicts caused by illegal users' misappropriation of IP addresses. In order to avoid such IP conflicts, the client has the function of filtering ARP packets. The specific process for the client to access the network is as follows:

[0106] Step 711: After the illegal user configures the stolen IP address A on the client ...

Embodiment 3

[0113] The specific system architecture in this embodiment is as follows Figure 7C As shown, including the gateway device that accesses the network, the switch device that accesses the gateway device, the client that accesses the switch device, the other HUB that accesses the gateway device or the switch of the present invention, and the authentication management device located anywhere on the network . The switch device controls all connected clients, and all clients must pass the address authentication of the authentication management device before they can access the network. Clients are also connected to other HUBs or switches that are not in accordance with the present invention. This method may cause IP conflicts caused by illegal users’ IP addresses to surf the Internet and cause adverse effects on legitimate users (such as intermittent messages). In order to avoid this Adversely, the authentication management device has the function of setting the static ARP information of...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for controlling the net surfing of a user. The method comprises the following steps: an authentication request containing an address and authentication cipher information sent from a client is received; according to the matching relation between the stored address and an authentication cipher, whether the address and the authentication cipher in the authentication request are matched is judged; and when the address and the authentication cipher in the authentication request are not matched, the client is forbidden accessing the network. The embodiment of the invention discloses a system for controlling the net surfing of the user and equipment thereof. The method can effectively improve the security for preventing an illegal user from using an embezzled address to access the net.

Description

Technical field [0001] The present invention relates to the field of network security, in particular to a method, system and equipment for controlling users to surf the Internet. Background technique [0002] IP address embezzlement refers to the phenomenon that illegal users use unauthorized IP addresses to configure computers to access the network. [0003] Theft of IP addresses will cause IP conflicts. After the Internet user configures the IP address on Computer 1, Computer 1 will send out an Address Resolution Protocol (ARP) request message containing the IP address to detect whether there is already a computer 2 in the LAN that uses this IP address to access the network. If it exists, computer 2 receives the ARP request message, finds that the IP address in the ARP request message is the same as its own IP address, prompts that an IP conflict occurs, and returns an ARP response message containing the IP address to computer 1, Computer 1 receives the ARP response message and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 林雁敏
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products