Check patentability & draft patents in minutes with Patsnap Eureka AI!
Method and system for controlling SILSN (Subscriber Identifier & Locator Separation Network)
What is Al technical title?
Al technical title is built by PatSnap Al team. It summarizes the technical point description of the patent document.
A technology of identity identification and separation of networks, applied in the field of communication
Active Publication Date: 2014-03-12
苏州栈云净化科技有限公司
View PDF3 Cites 0 Cited by
Summary
Abstract
Description
Claims
Application Information
AI Technical Summary
This helps you quickly interpret patents by identifying the three key elements:
Problems solved by technology
Method used
Benefits of technology
Problems solved by technology
[0012] In order to protect the security of the SILSN core network, SILSN only provides SILSN users and LIN users to communicate with each other, and prohibits LIN users from accessing network nodes in these core networks, such as ASN, ILR, and ISN, but there is no way to prevent LIN users from accessing Method for network nodes in SILSN core network
Method used
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more
Image
Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
Click on the blue label to locate the original text in one second.
Reading with bidirectional positioning of images and text.
Smart Image
Examples
Experimental program
Comparison scheme
Effect test
Embodiment 1
[0136] This embodiment 1 is described with an application example in which the administrator user of the SILSN located in the LIN initiates access, such as Figure 4 Shown:
[0137] Step 401: The user UE1 located in the LIN needs to access the core network node in the SILSN network, and sends a network management request message to the ISN, wherein the network management request message can be encapsulated in an IP data packet, and its destination address is the address of the CNMP, After the ISN receives the network management request message, if it is detected that the receiver of the message is CNMP, step 402 is performed;
[0138] It should be noted that CNMP should pre-determine the format of this network management request message. When ISN finds that the source address / source port of the data packet from LIN is not in OPT, CNMP checks whether the data is in this message format. If not, then throw away. If it is, extract the source address port, and use this source add...
Embodiment 2
[0157] This embodiment is described with the application example that the common user of LIN network initiates the visit, as Figure 5 Shown:
[0158] Step 501, the ISN receives a data packet from the LIN, and extracts its destination address.
[0159] Step 502, the ISN judges whether the destination address of the data packet is a CNMP address, if yes, execute step 503, otherwise, execute step 507.
[0160] Step 503, when the destination address is the CNMP address, extract the source address and source port number of the data packet.
[0161] Step 504, judge whether the source address and port number are in the OPT, if so, execute step 505, otherwise, execute step 508.
[0162] Step 505, if it is in the OPT, further judge whether its status is "open", if not, then discard.
[0163] Step 506, if it is open, forward the data packet to CNMP.
[0164] Step 507, when the destination address is not the CNMP address, process it as the first type of data packet, and details will...
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
PUM
Login to View More
Abstract
The present invention discloses a method, apparatus and system for controlling a user to access a network. The method includes: the node used for access control receives a data package of a user accessing the network node in an identifier and locator separation network; the destination address and destination port of the data package are obtained, and if the destination address and destination port belong to the addresses and ports of the destination network elements which need to execute an access control, then the source address and source port of the data package are obtained; the node used for access control researches the corresponding access authority of the source address and source port according to the obtained source address and source port of the data package and the corresponding relation information between the recorded source address, source port and the authority for accessing the network node; if the corresponding access authority of the source address and source port is found, the node used for access control controls the communication from the user to the network node according to the authority. The present invention solves the problem of the network management user in a Legacy Internet network (LIN) accessing the Subscriber Identifier and Locator Separation Network (SILSN) core network element, and guarantees the security of the core network.
Description
technical field [0001] The invention relates to the field of communication technology, and relates to a method and a system for controlling user access to network nodes in the identity and location separation network under the network framework of separation of identity and location. Background technique [0002] The IP address in the Transmission Control Protocol / Internet Protocol (TCP / IP) protocol widely used in the existing Internet has dual functions. As the identity of the network interface of the transport layer host. At the beginning of the TCP / IP protocol design, the movement of the host was not considered. However, when the host mobile becomes more and more common, the semantic overload defect of this IP address becomes more and more obvious. When the IP address of the host changes, not only the route will change, but also the identity of the communication terminal host will change, which will lead to an increasingly heavy routing load, and the change of the host ...
Claims
the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More
Application Information
Patent Timeline
Application Date:The date an application was filed.
Publication Date:The date a patent or application was officially published.
First Publication Date:The earliest publication date of a patent with the same application number.
Issue Date:Publication date of the patent grant document.
PCT Entry Date:The Entry date of PCT National Phase.
Estimated Expiry Date:The statutory expiry date of a patent right according to the Patent Law, and it is the longest term of protection that the patent right can achieve without the termination of the patent right due to other reasons(Term extension factor has been taken into account ).
Invalid Date:Actual expiry date is based on effective date or publication date of legal transaction data of invalid patent.