Unlock instant, AI-driven research and patent intelligence for your innovation.

Control method for network access based on proxy mode in network equipment

A network equipment, access network technology, applied in data exchange networks, data exchange details, digital transmission systems, etc., can solve the problem of inability to identify legitimate users, the rationality and efficiency of network resource use, and the inability to control user agent behavior. and other problems to achieve the effect of improving rationality and effectiveness and preventing access to services

Inactive Publication Date: 2005-06-29
HUAWEI TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the above method can control that the hosts connected to the network must be legally authenticated hosts, it cannot identify legitimate online users as proxy servers to access illegal users
That is to say, the existing method cannot identify whether a legitimate user acts as a proxy server, nor can it control the user's proxy behavior
Therefore, the existing network access control methods cannot prevent devices that have already connected to the network from accessing other illegal access devices through a proxy, resulting in a reduction in the rationality and efficiency of network resource use.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Control method for network access based on proxy mode in network equipment
  • Control method for network access based on proxy mode in network equipment
  • Control method for network access based on proxy mode in network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments.

[0030] The present invention can be applied to various network access systems, refer to figure 2 . User 1 to user N in the figure are connected to the MAN or the backbone network through the access server, and then connected to the Internet through the MAN or the backbone network. When a user accesses the network, the access server controls the user's access. When an access user's access device acts as an illegal proxy device to act as an illegal proxy device for other user devices connected to it to access the network, the access server restricts it. .

[0031] In the data access system, the transmission of information between the user equipment and the network access equipment, such as the access server, usually does not directly send "naked" IP packets, but is based on TCP (TransferControl Protocol, Transmission Control Protocol) or UDP ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a control method for accessing the network based on a proxy mode in a network device, the method includes establishing a characteristic information table and a user attribute table in the network device, which are respectively used to store the characteristic data and operation rights of legal users; the network device Receive the user's message and extract the feature data of the message; if there is a record corresponding to the extracted feature data in the feature information table, forward the message and refresh the time stamp of the feature data corresponding to the message; if there is no For the corresponding record, look up the authority of the user that the message belongs to in the user attribute table, and judge whether the user has the right to add new characteristic data based on this. The feature data is added to the feature information table, and then the message is forwarded, and the time stamp of the feature data corresponding to the message is refreshed. By adopting the above-mentioned solution, it is possible to prevent illegal agents from accessing services, thereby improving the rationality and effectiveness of using network resources.

Description

Technical field: [0001] The invention relates to an access control method in a communication system, in particular to a control method for a network device to access the network through proxy service. Background technique: [0002] With the popularization of broadband data access, many Internet service providers (ISPs) will encounter such a problem, that is, after a device is connected to the network, its user's device, such as a computer, is also connected to the network through a proxy In order to reduce the cost of network usage, the ISP loses the revenue brought by the customers who should have direct access. Therefore, it is very important for the ISP to prevent users from accessing other users without permission through a proxy. [0003] At present, the common control method used by ISPs to restrict illegal users from accessing the network is to use some methods such as PPP (Point-to-Point Protocol) authentication, WEB authentication, etc., to check the source IP addr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/22H04L12/24
Inventor 侯超常悦李力吴海军
Owner HUAWEI TECH CO LTD