Safe access method for borad band network

A technology for secure access and broadband network, applied in the access field of network systems, can solve the problems of poor security, endanger network security, hidden dangers of DHCP server security, etc., and achieve the effects of isolation protection, improved security, and good security.

Inactive Publication Date: 2003-11-26
HUAWEI TECH CO LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the above process, as long as the user terminal initiates a DHCP request, no matter whether it is an illegal user or a legitimate user, it will obtain a large amount of information including the IP address of the DHCP server and the IP address assigned to the user. Obtaining t

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe access method for borad band network
  • Safe access method for borad band network

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0012] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0013] In the process of user network access, the DHCP request message sent by the user terminal needs to be forwarded to the DHCP server through the DHCP relay server in the network. Therefore, the DHCP server can feed back the response message from the DHCP server to the user terminal at the DHCP relay server. The text is processed to isolate the DHCP server from the user.

[0014] figure 1 It is a flowchart of the method embodiment of the present invention. according to figure 1 First, the user terminal sends a DHCP request message for requesting network access to the DHCP relay server in step 1. The DHCP relay server receives the DHCP request message from the user terminal in step 2, and then forwards the DHCP request message of the user terminal To the DHCP server; after receiving the DHCP request message from the user terminal in step 3, the DHCP server as...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention discloses a broadband network safety cut-over method including: DHCP relay server transfers a received DHCP request message sent by an end user about applying for access to the networkto DHCP server which allocates IP address for the said end user and puts down the allocated user IP address and its own IP address the network initialized information in a DHCP response message to besent to DHCP relay server which shields the IP address of DHCP server in the respose message, then to be transferred to the user who gets the IP address allocated to him and cuts over into the network to prevent users from knowing the true DHCP server IP address to realize isolated protection to DHCP server.

Description

technical field [0001] The invention relates to a network system access method, in particular to a broadband network access method. Background technique [0002] In a broadband network, if a user terminal sends a network access request, the server responsible for IP address allocation in the network will assign an Internet (IP) address to the user terminal that sends the network access request, so that the user terminal can access the network. At present, the servers participating in the user terminal network access in the broadband network are DHCP servers and DHCP relay servers using standard Dynamic Host Configuration Protocol (DHCP, DynamicHost Configuration Protocol). When the user terminal performs network access, the user terminal first Send a DHCP request message to the DHCP relay server to apply for access to the network. After receiving the request message, the DHCP relay server forwards it to the DHCP server. After receiving the DHCP request message from the user ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/10H04L29/06H04L29/12H04M3/42H04M11/06
Inventor 张群
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products