Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, system and equipment for controlling user networking

A user and device technology, applied in the field of network security, can solve the problems of low security, illegal users cannot pass identity verification, and cannot prevent the theft of internal network IP addresses, etc., to achieve the effect of improving security

Active Publication Date: 2013-04-24
RUIJIE NETWORKS CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The firewall is used to isolate the internal network and the external network. Users access the external network through a proxy server, but identity verification is required. Only after the identity verification is passed can they access the external network. Then, even if an illegal user steals the IP address of a legitimate user, due to It does not know the legal user name and password. Illegal users cannot pass the authentication of the proxy server and naturally cannot access the external network.
This method cannot prevent IP address theft of the internal network
[0015] To sum up, the methods adopted in the prior art to prevent illegal users from using stolen and unauthorized addresses to access the network are less secure, which will affect the normal Internet access of legitimate users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and equipment for controlling user networking
  • Method, system and equipment for controlling user networking
  • Method, system and equipment for controlling user networking

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0094] The specific system architecture in this embodiment is as Figure 7A As shown, it includes a gateway device accessing the network, a switch device accessing the gateway device, a client accessing the switch device, and an authentication management device located anywhere on the network. The switch device controls all connected clients, and all clients must pass the address authentication of the authentication management device before they can access the network. The specific process of the client accessing the network is as follows:

[0095] Step 701: After the user configures an IP address on the client terminal and enters authentication password information, the client sends an authentication request including the IP address, the client MAC address and authentication password information to the switch device;

[0096] Step 702: The switch device receives the authentication request, and sends the authentication request to the authentication management device;

[0097...

Embodiment 2

[0100] The specific system architecture in this embodiment is as Figure 7B As shown, it includes a gateway device connected to the network, a switch device connected to the gateway device, a client connected to the switch device, other hubs or non-network management switches connected to the switch device, and authentication management devices located anywhere on the network. The switch device controls all connected clients, and all clients must pass the address authentication of the authentication management device before they can access the network. Clients are also connected to other HUBs or non-network management switches. In this way, there may be IP conflicts caused by illegal users stealing IP addresses. In order to avoid such IP conflicts, the clients have the function of filtering ARP packets. The specific process of the client accessing the network is as follows:

[0101] Step 711: After the illegal user configures the stolen IP address A on client 1 and enters wro...

Embodiment 3

[0108] The specific system architecture in this embodiment is as Figure 7C As shown, it includes the gateway device accessing the network, the switch device accessing the gateway device, the client accessing the switch device, other HUBs accessing the gateway device or switches not of the present invention, etc., and the authentication management device located anywhere in the network . The switch device controls all connected clients, and all clients must pass the address authentication of the authentication management device before they can access the network. Clients are also connected under other HUBs or non-invention switches. This method may cause IP conflicts caused by illegal users' stolen IP addresses to access the Internet and cause adverse effects on legitimate users (such as intermittent messages). In order to avoid this As a bad effect, the authentication management device has the function of setting the static ARP information of the authenticated client on the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for controlling the net surfing of a user. The method comprises the following steps: an authentication request containing an address and authentication cipher information sent from a client is received; according to the matching relation between the stored address and an authentication cipher, whether the address and the authentication cipher in the authentication request are matched is judged; and when the address and the authentication cipher in the authentication request are not matched, the client is forbidden accessing the network. The embodiment of the invention discloses a system for controlling the net surfing of the user and equipment thereof. The method can effectively improve the security for preventing an illegal user from using an embezzled address to access the net.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method, system and equipment for controlling user access to the Internet. Background technique [0002] IP address theft is the phenomenon in which illegal users use unauthorized IP addresses to configure computers to access the network. [0003] IP address theft will cause IP conflicts. After an Internet user configures an IP address on computer 1, computer 1 will send an address resolution protocol (Address Resolution Protocol, ARP) request message containing the IP address to detect whether there is already a computer 2 using this IP address to access the network in the LAN , if it exists, computer 2 receives the ARP request message, finds that the IP address in the ARP request message is the same as its own IP address, prompts an IP conflict, and returns an ARP response message containing the IP address to computer 1, Computer 1 receives the ARP response message and finds ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 林雁敏
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products