Check patentability & draft patents in minutes with Patsnap Eureka AI!

Agency testing method

A detection method and detection result technology, applied in the network field, can solve problems such as poor manageability, difficult authentication equipment cooperation, increased network burden, etc., and achieve an easy-to-manage effect

Inactive Publication Date: 2005-08-10
HUAWEI TECH CO LTD
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because this account sharing method seriously damages the interests of operators, thus affecting the return on investment of operators and managers in network construction and operation
In addition, in some network environments with high security requirements (such as publishing Falun Gong and other reactionary speeches), administrators do not allow users to use the network by setting up proxies to hide their real identities.
In a nutshell, there are two problems: one is to use agents to evade billing, and the other is to use agents to express reactionary remarks
[0014] 1) Increase network load, high cost
When the server runs the scanning software, it needs to send a large number of test packets to all user devices, which increases the network burden and consumes a lot of server.
[0015] 2) Poor manageability
Scanning software can only find problems, and it is difficult to cooperate with certified devices to adopt relevant strategies to deal with them

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Agency testing method
  • Agency testing method
  • Agency testing method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Fig. 3 is a schematic diagram of a PPP frame format. Among them, the F field identifies the beginning and end of a PPP frame; the FCS field is the check field of the frame; the content of the frame is included in the address (Address), control (Control), protocol (Protocol), and information (Information) fields content. When the Protocol field in the PPP frame (see IETF RFC1661) indicates that the protocol type is C227 (that is, the protocol is the PPP extensible authentication protocol), encapsulate and only encapsulate one PPP extensible authentication protocol message in the Information field of the PPP frame ( The present invention is called EAP message), and each domain is transmitted sequentially from left to right during transmission. The proxy detection method of the present invention is realized by extending the attribute type of the EAP message, and is also encapsulated in the Information field for transmission. The principle is as described below.

[0034] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes following flows: in authentication flow, logic ports of authentication device are authorized to user device; in flow of testing proxy, proxy test is completed through EAP message of carrying attribute type as proxy test interacted between authentication device and user device. The flow of testing proxy includes following steps: (1) authentication device sends EAP request message with attribute being as proxy test to user device to test whether user device uses proxy or not; (2) user device sends EAP acknowledgement message with attribute type being as proxy test to authentication device to send tested result to authentication device; and based on tested result, corresponding processing measures are adopted. Through expanding an attribute type being as proxy test, the invention realizes proxy test by using combination between EAP request message and EAP acknowledgement message. The invention does not need to add additional cost and network load.

Description

technical field [0001] The invention relates to network technology, in particular to an agent detection method in the network. Background technique [0002] The local area network defined by the IEEE 802 LAN protocol does not provide access authentication. Generally speaking, as long as users can access the LAN, they can access devices or resources on the network. However, for applications such as telecommunication access, office building LAN, and mobile office, network managers hope to control and configure user access, which creates a need for Port Based Network Access Control. That is, the IEEE 802.1X (hereinafter referred to as 802.1X) protocol. [0003] As can be seen from Figure 1, the architecture of 802.1X includes: [0004] User equipment (Supplicant) 1, the entity (Entity) at the end of the LAN connection, initiates a request to the authentication device (Authenticator) as an authentication requester, and checks the legitimacy of its identity; [0005] The authe...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 刘刀桂杜凤山何强刘宜平杨利明王松波
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More