Unlock instant, AI-driven research and patent intelligence for your innovation.

Method of proxy service detection for user terminal

A technology of proxy service and detection method, applied in the field of user access authentication, to achieve the effect of low false detection rate

Active Publication Date: 2007-06-13
NEW H3C TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The false detection phenomenon of this method is more serious. For example, in the office network of some small companies, only a few terminals need to connect to the external network. Both the modem (modem) and the network card connected to the internal Ethernet are working, and they are in different network segments

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method of proxy service detection for user terminal
  • Method of proxy service detection for user terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] As shown in FIG. 1 , the authenticated user terminal 120 is connected to the internal network and the external network at the same time. Then at least two network devices are active on the user terminal 120, wherein the network device connected to the internal network has an internal network IP address, and the network device connected to the external network has an external network IP address. During the service, the user terminal 111 that has not passed the authentication sends the message whose destination address is the IP address of the external network to the user terminal 120, and the proxy service on the user terminal 120 rewrites the header part of the message and forwards it to the external network, for example The source address in the header is changed from the IP address of the user terminal 111 to the external network IP address of the local machine, and the text part of the message is not processed. And when the user terminal 120 receives the message that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a proxy service testing method of user terminal, which comprises the following steps: a) setting massage sampling requirement; for the transmitted massage meeting the sampling requirement, preserving address attribute data according to destination address, and preserving the attribute data of the main body of the transmitted massage; for the received massage meeting the sampling requirement, preserving address attribute data according to the source address, and preserving the attribute data of the main body of the receiving massage; b) counting the massage couple with same attribute data and different address attribute data form the stored transmitted massage and received massage; c) deciding if the counted number is more than the preset critical number, if it is, then making sure that user terminal providing proxy service. Said method has noting to do with the proxy program and the hardware of the user terminal, besides, it can reach to lowest fallout ratio.

Description

technical field [0001] The invention relates to the field of user access authentication of wired and wireless networks, in particular to a proxy service detection method of a user terminal. Background technique [0002] In wired network and wireless network applications, network service operators manage billing and security through user access authentication. In particular, broadband networks, campus networks, and network service operators, which are currently widely used, need to charge each user's online behavior, and at the same time control the access range of some users. All users of the service shall be authenticated by the operator. [0003] In some networking environments, a user authenticated by the operator can provide network proxy services, so that other unauthenticated users can freely access network services, resulting in loss of network service operator revenue and network security management. loophole. As shown in Figure 1, unauthenticated user terminals 1...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/26
Inventor 杜凤山李传峰袁伟欧珊瑚
Owner NEW H3C TECH CO LTD