Method and device for preventing network attack based on Web authentication technology

A network attack and technology technology, applied in the field of computer communication, can solve the problem of inability to judge the legality of the message

Inactive Publication Date: 2016-12-14
HANGZHOU DPTECH TECH
View PDF7 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when other terminal devices steal the IP address of the successfully authenticated terminal device to send a message, the access device in the Web authentication mechanism cannot judge the validity of the message, so that it will process the illegal message normally, resulting in Such network attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing network attack based on Web authentication technology
  • Method and device for preventing network attack based on Web authentication technology
  • Method and device for preventing network attack based on Web authentication technology

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0020] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for preventing network attack based on a Web authentication technology. The method comprises the steps of receiving a message through a port which does not open Web authentication locally; judging whether a source IP address of the message hits a preset online IP list or not, wherein the online IP list contains a plurality of IP addresses of terminal equipment which are already successfully authenticated on a port which already opens Web authentication locally; and determining the message is an illegal message if the source IP address of the message hits the online IP list, and discarding the message. By applying the embodiment of the invention, access equipment can be prevented from initiating a network attack behavior through embezzling an IP address of terminal equipment which passes Web authentication.

Description

technical field [0001] The present application relates to the field of computer communication, in particular to a method and device for preventing network attacks based on Web authentication technology. Background technique [0002] Web authentication technology is an authentication method based on user name and password. In the mechanism of Web authentication, access control can usually be performed at the access device and the key data entrance that needs to be protected, and the terminal device of the user who wants to access Internet resources is authenticated. After the authentication is successful, the user's terminal device is allowed to access the Internet. Resources, in order to realize the control of the user's terminal equipment to access Internet resources. [0003] However, when other terminal devices steal the IP address of the successfully authenticated terminal device to send a message, the access device in the Web authentication mechanism cannot judge the v...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0876H04L63/0245H04L63/1466H04L67/02
Inventor 姚子熙
Owner HANGZHOU DPTECH TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products