Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for controlling access request on basis of proxy gateway

An access request, proxy gateway technology, applied in the field of communication, can solve problems such as attacks and data cannot be processed, achieve flexible protection measures, improve security and flexibility

Active Publication Date: 2012-09-19
NANJING ZHONGXING XIN SOFTWARE CO LTD
View PDF6 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the https (referring to the http service encrypted with TLS) proxy service has its own defects, that is, the HTTP CONNECT proxy server is a proxy server that allows users to establish a TCP connection to any port, which means that this proxy can not only be used for http Proxy service can also be used for FTP, IRC, RM streaming services, etc., and can even be used for scanning and attacking. For example, the terminal can take advantage of the defect that the WAP gateway cannot process Https request data, and use the HTTP CONNECT proxy to monitor important systems of the WAP gateway. Scanning, attacking, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for controlling access request on basis of proxy gateway
  • Method and device for controlling access request on basis of proxy gateway
  • Method and device for controlling access request on basis of proxy gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to realize the control of the proxy gateway to the Https access request, prevent the terminal from performing abnormal operations on the proxy gateway through the TLS tunnel, thereby improving the security of the proxy gateway application system, in the embodiment of the present invention, the proxy gateway receives the terminal to establish a TLS connection. https access request, the https access request carries at least a 2-tuple control parameter, and the proxy gateway judges whether the 2-tuple control parameter carried by the received https access request is legal according to the preset screening strategy, and if so, allows the terminal Establish a TLS connection through the https access request; otherwise, reject the terminal to establish a TLS connection through the https access request.

[0019] In the embodiment of the present invention, the so-called proxy gateway can be a WAP gateway or a WEB gateway, and the so-called two-tuple control parameter can...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of communication and discloses a method for controlling an http access request on the basis of a proxy gateway. The method is used for increasing the safety of a proxy gateway application system. The method comprises the following steps of: receiving an https access request for establishing TLS (Transport Layer Security Protocol) connection sent by a terminal by the proxy gateway; judging if a binary set control parameter carried by the https access request is legal by the proxy gateway according to a preset screening strategy; if yes, allowing the terminal to establish TLS connection through the https access request; and if not, refusing the terminal to establish TLS connection through the https access request. Thus, the preset binary set control parameter can be used for flexibly managing and controlling the https access request for establishing TLS connection, the illegal TLS connection is effectively blocked, more flexible protective measures are supplied to a proxy gateway running system, and the safety and flexibility of a service control flow of the proxy gateway are increased.

Description

technical field [0001] The invention relates to the communication field, in particular to a method and device for controlling based on Https access requests. Background technique [0002] With the development of Internet technology, users' demand for larger-scale and richer-form services on the Internet is also growing. At present, WAP (Wireless Application Protocol, wireless application protocol) gateway is usually used as the Internet proxy of terminal users. The most basic function of WAP gateway is to act as a proxy server for terminals, proxying terminals to access WAP websites and Internet content, and providing basic http proxy services And the protocol conversion function of WAP1.x. In order to protect the user's private data, the WAP gateway provides an encrypted data access channel requested by https, called the TLS (Transport Layer Security Protocol, Transport Layer Security Protocol) tunnel, and the user negotiates the key through the two ends of the TLS tunnel....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/08
CPCH04L63/166H04L63/168
Inventor 郭孟振黄晓兵海永军
Owner NANJING ZHONGXING XIN SOFTWARE CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More