Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for handling violations of satellite network users combined with access authentication and related equipment

A satellite network and access authentication technology, applied in the field of communication, can solve problems such as difficult communication at the user end, achieve the effect of reducing authentication transmission delay, alleviating the risk of single point failure and performance bottleneck

Active Publication Date: 2022-04-26
TSINGHUA UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides a satellite network user violation processing method combined with access authentication and related equipment, and performs access authentication and violation processing through the joint satellite network front-end satellite network base stations, so as to alleviate the central access authentication method The single point of failure risk and performance bottleneck in the satellite network center that are easy to occur, and solve the problem that it is difficult to limit the communication in a timely and effective manner when the legitimate user end violates the rules after accessing the network anonymously

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for handling violations of satellite network users combined with access authentication and related equipment
  • Method for handling violations of satellite network users combined with access authentication and related equipment
  • Method for handling violations of satellite network users combined with access authentication and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0141] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0142] The invention provides a satellite network user violation processing method combined with access authentication and related equipment.

[0143] refer to figure 1 , figure 1 It is a schematic diagram of a scenario of a satellite network user violation processing method combined with access authentication according to the present invention.

[0144] Among them, the satellite co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a satellite network user violation processing method combined with access authentication and related equipment. The method includes: completing high-frequency access authentication for a large number of user terminals through each satellite communication base station at the front end of the network, so as to alleviate central authentication Easy-to-produce single point failure risks and performance bottlenecks reduce authentication transmission delays; after the access authentication is passed, the client performs data communication with the authenticated anonymous identity, and the Satcom base station combines the cached anonymous identity with the first parameter of the token. Carry out violation detection and preliminary judgment, and deal with the user terminals with lower-level violations; for the user terminals with higher-level violations, the satellite network center will calculate the real identity of the violation users after further violation judgments , update the relevant blacklist, and cooperate with various Satcom base stations to deal with violations, so that while taking into account the anonymity of user access identities, it is also convenient to trace and deal with violations after discovery.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a satellite network user violation processing method combined with access authentication and related equipment. Background technique [0002] With the development and wide application of communication satellite communication networks, more and more insecure factors have emerged, among which there are many cases of launching network attacks by pretending to be legitimate user identities. For this reason, before the user terminal officially accesses the satellite communication network for communication transmission of a large amount of data, two-way security access authentication is often required: on the one hand, the satellite network terminal needs to authenticate that the access is a legitimate user to protect the system security; On the other hand, the user terminal also needs to authenticate that the access is a legal satellite communication network, so as to prevent i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/084H04W12/106H04W84/06
CPCH04W12/068H04W12/084H04W12/106H04W84/06
Inventor 裴玉奎王丽敏王嘉博许晋殷柳国
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products