Method for securing special line user access network
A user and private line technology, applied in the network field, can solve the problems of heavy configuration workload, easy IP address theft, difficult management, etc., to achieve the effect of avoiding theft
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0034] The following describes the present invention in further detail based on the drawings and embodiments:
[0035] Many options are defined in the DHCP protocol, one of which is Option82, such as figure 1 As shown, two sub-options, Circuit ID Sub-option (CID) and Remote ID Sub-option (RID) are defined, among which:
[0036] CID is the link identifier, generally used to identify the user's access location information (partial information);
[0037] RID is the remote identification, and is generally used to identify the attribute information (global information) of the device.
[0038] The general flow of the DHCP protocol is as follows figure 2 As shown, the DHCPDiscovery message sent by the user indicates the beginning of a user's dynamic address acquisition, and a DHCPACK (response) message returned by the server indicates the end of a successful address acquisition.
[0039] The access device (such as DSLAM) of the present invention first captures the uplink DHCP messages ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap