SMA network access method and device

A networking and terminal technology, applied in the field of communication, can solve problems such as inability to access SMA networking

Active Publication Date: 2018-01-05
XINHUASAN INFORMATION TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present application provides an access method and device for an SMA network to solve the problem that terminals outside the SMA network cannot access the SMA network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • SMA network access method and device
  • SMA network access method and device
  • SMA network access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0038] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a forged source address check SMA network access method and device based on a state machine. An autonomous system AS border router AER of the SMA network performs the method asfollows, a first message sent by a terminal outside the SMA network is received; the designated bit of the SMA message of the first message is acquired; if a value of the designated bit is matched with a preset value, the first message is determined to be an authentication message sent by the terminal outside the SMA network to an autonomous system control server ACS in the SMA network; the authentication message is redirected to the ACS in the AS to carry out authentication; the authentication result returned from the ACS is received, if the authentication result passes, the terminal is permitted to access the AS; if the authentication result does not pass, the terminal is not permitted to access the AS. The method is advantaged in that the terminal outside the SMA network is facilitatedto access the SMA network, and remote office work of the terminal outside the SMA network is realized.

Description

technical field [0001] The present application relates to the technical field of communications, and in particular to a method and device for accessing an SMA network. Background technique [0002] SMA (State Machine based Anti-spoofing, forged source address check based on state machine) network is an end-to-end source address verification scheme between IPv6 (Internet Protocol Version 6, 6th edition Internet Protocol) autonomous systems to prevent forgery Attacks on source IPv6 addresses. The SMA network includes a trust alliance composed of mutually trusted AS (Autonomous System, autonomous system), and the AS includes an ACS (AS Control Server, AS Control Server) and an AER (AS Edge Router, AS Border Router) connected to the ACS. [0003] After the ACS registers with the REG (Registration Center, Alliance Registration Center) as a member of the trust alliance, the REG is responsible for notifying the registration information of the ACS to other member ACSs in the same t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 徐燕成
Owner XINHUASAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products