Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safe access method for borad band network

A technology for secure access and broadband network, applied in the access field of network systems, can solve the problems of poor security, endanger network security, hidden dangers of DHCP server security, etc., and achieve the effects of isolation protection, improved security, and good security.

Inactive Publication Date: 2003-11-26
HUAWEI TECH CO LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the above process, as long as the user terminal initiates a DHCP request, no matter whether it is an illegal user or a legitimate user, it will obtain a large amount of information including the IP address of the DHCP server and the IP address assigned to the user. Obtaining the IP address of the DHCP server very easily will inevitably bring security risks to the DHCP server, causing the DHCP server to be vulnerable to attacks, thereby endangering the security of the entire network. Therefore, the security of the existing network access methods is poor

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe access method for borad band network
  • Safe access method for borad band network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0012] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0013] Since during the user network access process, the DHCP request message sent by the user terminal needs to be forwarded to the DHCP server through the DHCP relay server in the network, so the response message fed back to the user terminal by the DHCP server at the DHCP relay server can be The text is processed to realize the isolation between the DHCP server and the user.

[0014] figure 1 It is a flow chart of the method embodiment of the present invention. according to figure 1 First, the user terminal sends a DHCP request message for network access to the DHCP relay server in step 1; the DHCP relay server receives the DHCP request message of the user terminal in step 2, and then relays the DHCP request message of the user terminal To the DHCP server; After the DHCP request message of the user terminal is received by the step 3DHCP server, the IP a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses a broadband network safety cut-over method including: DHCP relay server transfers a received DHCP request message sent by an end user about applying for access to the networkto DHCP server which allocates IP address for the said end user and puts down the allocated user IP address and its own IP address the network initialized information in a DHCP response message to besent to DHCP relay server which shields the IP address of DHCP server in the respose message, then to be transferred to the user who gets the IP address allocated to him and cuts over into the network to prevent users from knowing the true DHCP server IP address to realize isolated protection to DHCP server.

Description

technical field [0001] The invention relates to a network system access method, in particular to a broadband network access method. Background technique [0002] In a broadband network, if a user terminal sends a network access request, the server responsible for IP address allocation in the network will assign an Internet (IP) address to the user terminal that sends the network access request, so that the user terminal can access the network. At present, the servers participating in the user terminal network access in the broadband network are DHCP servers and DHCP relay servers using standard Dynamic Host Configuration Protocol (DHCP, DynamicHost Configuration Protocol). When the user terminal performs network access, the user terminal first Send a DHCP request message to the DHCP relay server to apply for access to the network. After receiving the request message, the DHCP relay server forwards it to the DHCP server. After receiving the DHCP request message from the user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/10H04L29/06H04L29/12H04M3/42H04M11/06
Inventor 张群
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products