Security protection method, equipment and system for data packet

A technology of safety protection and safety equipment, applied in the field of communication, can solve problems such as large limitations, and achieve the effect of enhancing reliability

Inactive Publication Date: 2009-06-10
HUAWEI DIGITAL TECH (CHENGDU) CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] However, in the process of hacker attacks, most of them are attacks launched by bots, so it is easy to construct IP addresses or protocols that conform to the NAT mapping table
Therefore, the limitation of only restricting the protocol of IP address or NAT data is still very large.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security protection method, equipment and system for data packet
  • Security protection method, equipment and system for data packet
  • Security protection method, equipment and system for data packet

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0033] Such as figure 1 As shown, a security protection method for a data packet in the embodiment of the present invention includes:

[0034] Step 101: A communication device such as a NAT firewall device receives a data packet sent from an external network.

[0035] Step 102: The NAT firewall device judges whether the characteristic data of the data packet exists in the Network Address Translation Protocol NAT mapping table. If the characteristic data of the da...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method, a device and a system for protecting a data packet safely. The method comprises the following steps: receiving the data packet sent by an outside network; judging whether the time to life (TTL) value of the data packet is in a legal interval or not if characteristic data of the data packet exists in a network address translation (NAT) protocol mapping table; and releasing the data packet if the TTL value of the data packet is in the legal interval. By adopting the method, the reliability for the security judging result of the data packet can be enhanced.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a data packet security protection method, device and system. Background technique [0002] In theory, using a Network Address Translation (NAT, Network Address Translation) server can allow hosts on the inner private network to access the public network, while hiding the real Internet Protocol (IP, Internet Protocol) address of the private network host from the public network. The public network users outside the NAT server cannot pass through the NAT server to enter the private network hosts, which ensures the security of the private network hosts to a certain extent. [0003] However, in the actual application of communication technology, the public network users outside the NAT server are not hosts that cannot pass through the NAT server to enter the private network. , Transmission ControlProtocol) message as an example: [0004] Example 1: A private network u...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L29/06H04L45/18
Inventor 王丹峰钟登峰
Owner HUAWEI DIGITAL TECH (CHENGDU) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products