Unlock instant, AI-driven research and patent intelligence for your innovation.

A method and device for preventing fake offline attack

An offline and terminal technology, applied in the field of communications, can solve problems such as no solution, unable to use the network normally, and achieve the effect of reducing the load

Active Publication Date: 2020-01-03
XINHUASAN INFORMATION TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] Therefore, when there is a counterfeit offline message attack in the network, the terminal will repeatedly go online and offline and cannot use the network normally, and it will cause the network access server and the authentication, authorization, and accounting (Authentication, Authorization, Accounting, AAA) server to keep going. run under high load
[0004] However, no effective solution has been proposed for the problems caused by counterfeit offline messages.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and device for preventing fake offline attack
  • A method and device for preventing fake offline attack
  • A method and device for preventing fake offline attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0023] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This application provides a method and device for preventing counterfeit offline attacks. The method is as follows: after the terminal logs in and goes online, the network access server judges whether the number of logins in the login history entry corresponding to the terminal exceeds the set value, and logs in The history entry is used to record the cumulative login times of the terminal within a set period of time; if so, control the terminal to keep online for a set period of time after logging in and going online. The method can ensure that the terminal can normally use the network when it is attacked by the counterfeit offline message, and can reduce the load brought by the counterfeit offline message to the network access server and the AAA server.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a method and device for preventing counterfeit offline attacks. Background technique [0002] There is a fake offline message in the network. This message will fake an online terminal to initiate an offline request to the network access server, causing the online terminal to be forcibly offline, and the terminal that is forcibly offline may reconnect to the network The access server initiates an online request. [0003] Therefore, when there is a counterfeit offline message attack in the network, the terminal will repeatedly go online and offline and cannot use the network normally, and it will cause the network access server and the authentication, authorization, and accounting (Authentication, Authorization, Accounting, AAA) server to keep going. operating under high load. [0004] However, no effective solution has yet been proposed for the problems caus...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0892H04L63/1441H04L67/54
Inventor 章靠廖以顺
Owner XINHUASAN INFORMATION TECH CO LTD