Supercharge Your Innovation With Domain-Expert AI Agents!

Method and system for controlling SILSN (Subscriber Identifier & Locator Separation Network)

A technology for identifying and separating networks, applied in the field of communications

Active Publication Date: 2011-05-04
昆山创智汇知识产权运营有限公司
View PDF3 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] In order to protect the security of the SILSN core network, SILSN only provides SILSN users and LIN users to communicate with each other, and prohibits LIN users from accessing network nodes in these core networks, such as ASN, ILR, and ISN, but there is no way to prevent LIN users from accessing Method for network nodes in SILSN core network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling SILSN (Subscriber Identifier & Locator Separation Network)
  • Method and system for controlling SILSN (Subscriber Identifier & Locator Separation Network)
  • Method and system for controlling SILSN (Subscriber Identifier & Locator Separation Network)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0136] This embodiment 1 is described with an application example in which the administrator user of the SILSN located in the LIN initiates access, such as Figure 4 Shown:

[0137] Step 401: The user UE1 located in the LIN needs to access the core network node in the SILSN network, and sends a network management request message to the ISN, wherein the network management request message can be encapsulated in an IP data packet, and its destination address is the address of the CNMP, After the ISN receives the network management request message, if it is detected that the receiver of the message is CNMP, step 402 is performed;

[0138] It should be noted that CNMP should pre-determine the format of this network management request message. When ISN finds that the source address / source port of the data packet from LIN is not in OPT, CNMP checks whether the data is in this message format. If not, then throw away. If it is, extract the source address port, and use this source add...

Embodiment 2

[0157] This embodiment is described with the application example that the common user of LIN network initiates the visit, as Figure 5 Shown:

[0158] Step 501, the ISN receives a data packet from the LIN, and extracts its destination address.

[0159] Step 502, the ISN judges whether the destination address of the data packet is a CNMP address, if yes, execute step 503, otherwise, execute step 507.

[0160] Step 503, when the destination address is the CNMP address, extract the source address and source port number of the data packet.

[0161] Step 504, judge whether the source address and port number are in the OPT, if so, execute step 505, otherwise, execute step 508.

[0162] Step 505, if it is in the OPT, further judge whether its status is "open", if not, then discard.

[0163] Step 506, if it is open, forward the data packet to CNMP.

[0164] Step 507, when the destination address is not the CNMP address, process it as the first type of data packet, and details will...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and system for controlling an SILSN (Subscriber Identifier & Locator Separation Network). The method comprises the following steps: a node for access control receives a data packet of a network node in the SILSN; the node acquires the destination address and destination port of the data packet; if the destination address and destination port are the address and port of a destination network element needing access control, the node acquires the source address and source port of the data packet; the node for access control searches the access authority corresponding to the source address and source port according to the acquired source address and source port of the data packet as well as the recorded corresponding relationship information among the source address, the source port and the network node access authority; and if the access authority corresponding to the source address and source port is searched, the node for access control controls the communication between the subscriber and the network node according to the authority. Through the invention, the security of the SILSN can be protected.

Description

technical field [0001] The invention relates to the field of communication technology, and relates to a method and a system for controlling user access to network nodes in the identity and location separation network under the network framework of separation of identity and location. Background technique [0002] The IP address in the Transmission Control Protocol / Internet Protocol (TCP / IP) protocol widely used in the existing Internet has dual functions, both as the position identification of the communication terminal host network interface of the network layer in the network topology, It is also used as the identity of the network interface of the transport layer host. At the beginning of the TCP / IP protocol design, the movement of the host was not considered. However, when the host mobile becomes more and more common, the semantic overload defect of this IP address becomes more and more obvious. When the IP address of the host changes, not only the route will change, b...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L29/12H04L12/56
CPCH04W12/084
Inventor 张世伟符涛许志军
Owner 昆山创智汇知识产权运营有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More