Method and device for verifying message safety

A security and message technology, applied in the field of communication, can solve the problems of delay in detection timing, cumbersome manual configuration, complex implementation, etc., and achieve the effect of preventing attacks

Active Publication Date: 2010-09-01
NEW H3C TECH CO LTD
View PDF2 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0017] For solution 2, the message has already arrived at the gateway, the message has already impacted the CPU of the gateway, and the detection timin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for verifying message safety
  • Method and device for verifying message safety
  • Method and device for verifying message safety

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] Aiming at the deficiencies in the background technology, the present invention proposes a method for message security verification, which implements a method on the access device to verify user legitimacy by detecting ARP messages, and realizes user authentication by issuing ACL rules. Security filtering, thereby reducing the impact of user counterfeiting IP address attacks on the uplink network.

[0061] Such as figure 1 As shown in FIG. 1 , it is a schematic flowchart of a method for message security verification proposed by the present invention, and the method is applied to a system including at least one access terminal and one access device.

[0062] Wherein, a secure user list is established in the access device, and the secure user list is used to store information of secure access terminals, and the access device only checks the IP packets sent by the access terminal In the initial state of the access device, the established security user list is empty, thus, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method and a device for verifying message safety. By using the technical scheme of the invention, simple user validation judgment can be carried out on an access device to effectively verify the user validation at a position closest to a user, thereby preventing the attack of a message with a user-forged IP on an uplink network at an end point.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and equipment for message security verification. Background technique [0002] Ethernet is the main LAN technology used by TCP / IP today. ARP (Address Resolution Protocol, Address Resolution Protocol) is a low-level protocol located in the TCP / IP protocol stack, which is responsible for resolving an IP address into a corresponding MAC address. The basic function of the ARP protocol is to query the MAC address of the target device through the IP address of the target device to ensure the communication. ARP is Address Resolution Protocol, which is a protocol that converts IP addresses into physical addresses. [0003] Specifically, ARP is to resolve the network layer (IP layer, which is equivalent to the third layer of OSI) address to the MAC address of the data connection layer (MAC layer, which is equivalent to the second layer of OSI). [0004] ARP attack is an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/56H04L12/26H04L29/12H04L29/06
Inventor 葛建壮
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products