Unlock instant, AI-driven research and patent intelligence for your innovation.

A message processing method and device

A message processing and message technology, which is applied in the field of communication, can solve problems such as allowing passage, and achieve the effects of increasing the probability of taking effect and increasing the probability of accessing prohibited websites

Active Publication Date: 2021-07-23
NEW H3C TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] The present invention provides a message processing method and device to solve the problem that some messages that access the domain names in the domain name blacklist may be allowed to pass when the message is processed according to the IP address-based blocking rules

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A message processing method and device
  • A message processing method and device
  • A message processing method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to enable those skilled in the art to better understand the technical solutions in the embodiments of the present invention, and to make the above-mentioned purposes, features and advantages of the embodiments of the present invention more obvious and understandable, the following describes the technical solutions in the embodiments of the present invention in conjunction with the accompanying drawings For further detailed explanation.

[0022] See figure 1 , is a schematic flowchart of a message processing method provided by an embodiment of the present invention, wherein the message processing method can be applied to authentication devices, such as network devices such as routers or switches with authentication functions, such as figure 1 As shown, the message processing method may include the following steps:

[0023] Step 101: When receiving a message from the user terminal side and determining that the message is an HTTP message, query the domain name bl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a message processing method and device. The method includes: when receiving a message from the user terminal side and determining that the message is a hypertext transfer protocol (HTTP) message, according to the purpose of the message domain name query domain name blacklist; if the domain name blacklist includes the destination domain name, discard the message; if the domain name blacklist does not include the destination domain name, allow the message to pass. Applying the embodiments of the present invention can increase the probability that the blacklist of the domain name becomes effective, and further, increase the probability that the user terminal is prevented from accessing the forbidden website.

Description

technical field [0001] The present invention relates to the technical field of communications, in particular to a message processing method and device. Background technique [0002] Portal (portal) authentication receives the user name and password input by the user through the Web page, and performs identity authentication on the user, so as to achieve the purpose of controlling the access of the terminal device (referred to as the user terminal) used by the user. [0003] When the Portal authentication function is enabled, the rules that user terminals cannot access before and after authentication are called blacklists. The rule is manually configured by the administrator. According to different requirements and application scenarios, there are many ways to configure the blacklist. Specifically, the configuration of this type of rule includes two parts: source and destination. For source configuration, including based on source IP (Internet Protocol, Internet Protocol) an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08H04L29/12
CPCH04L61/103H04L63/10H04L67/02H04L61/4511
Inventor 孟雅
Owner NEW H3C TECH CO LTD