Management method, device, equipment and machine-readable storage medium of security entry

A management method and security table technology, which is applied in the field of machine-readable storage media and security table item management, can solve problems such as waste of resources, authentication server attacks, and affecting normal user online authentication, so as to save processing resources and avoid continuous impact Effect

Active Publication Date: 2020-12-29
NEW H3C TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

When the authentication server processes these authentication request messages, a lot of resources are wasted, causing attacks on the authentication server and affecting the online authentication of normal users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Management method, device, equipment and machine-readable storage medium of security entry
  • Management method, device, equipment and machine-readable storage medium of security entry
  • Management method, device, equipment and machine-readable storage medium of security entry

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The terminology used in the embodiments of the present disclosure is only for the purpose of describing specific embodiments, rather than limiting the present disclosure. As used in this disclosure and the claims, the singular forms "a", "the" and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term "and / or" as used herein is meant to include any and all possible combinations of one or more of the associated listed items.

[0034] It should be understood that although the embodiments of the present disclosure may use the terms first, second, third, etc. to describe various information, the information should not be limited to these terms. These terms are only used to distinguish information of the same type from one another. For example, without departing from the scope of the present disclosure, first information may also be called second information, and similarly, second inf...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The present disclosure provides a method, device, device, and machine-readable storage medium for managing a security entry. The method includes: after allocating an IP address to a DHCP client, determining the IP address and MAC address of the DHCP client; Send a first message, where the first message carries the IP address and the MAC address; the first message is used to make the DHCP relay record the correspondence between the IP address and the MAC address in the security entry, so that the The DHCP relay filters the received authentication message according to the security entry; after the DHCP client goes offline, determines the IP address and MAC address of the DHCP client; sends a second message to the DHCP relay, the The second message carries the IP address and the MAC address; the second message is used to make the DHCP relay delete the correspondence between the IP address and the MAC address from the security table entry. Through the technical solution of the present disclosure, the authentication server is prevented from processing a large number of illegal authentication messages, and the processing resources of the authentication server are saved.

Description

technical field [0001] The present invention relates to the field of communication technologies, and in particular to a management method, device, equipment and machine-readable storage medium for security entries. Background technique [0002] The DHCP (Dynamic Host Configuration Protocol, Dynamic Host Configuration Protocol) can adopt the client / server mode, and the DHCP server (Server) dynamically allocates an IP address for the DHCP client (Client). Moreover, when the DHCP client and the DHCP server are in different physical network segments, the DHCP client can also communicate with the DHCP server through a DHCP relay (Relay). [0003] The DHCP client sends a DHCP-DISCOVER (discovery) message in broadcast mode. After the DHCP relay agent receives the DHCP-DISCOVER message, it unicasts it to the specified DHCP server. After the DHCP server receives the DHCP-DISCOVER message, it selects the idle IP address, and send a DHCP-OFFER (offer) message to the DHCP client throug...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L63/0236H04L63/20H04L61/5014H04L2101/622
Inventor 李乐吴文汪亮
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products