Method for preventing offence between inserted users

A technology for accessing users and accessing devices, applied in digital transmission systems, electrical components, transmission systems, etc., can solve problems such as difficult to achieve firewalls to prevent complex attacks, fail to meet security requirements, etc., achieve low cost and prevent illegal attacks , the effect of high security requirements

Inactive Publication Date: 2006-09-13
HUAWEI TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the packet filtering strategy based on GGSN detection can only prevent attacks between access users to a limited extent, and it is difficult to prevent complex attacks on access users.
The reason is not difficult to understand: GGSN itself is not a dedicated firewall device, so it is difficult to achieve the high-level ability of the firewall to prevent complex attacks, and cannot meet high security requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for preventing offence between inserted users
  • Method for preventing offence between inserted users
  • Method for preventing offence between inserted users

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] On the basis of not changing the existing network structure, the present invention realizes the detection and filtering of the data flow between the access users through the mutual cooperation of the GGSN and the firewall equipment, so as to prevent the attacks between the access users . Referring to the accompanying drawings, the method for preventing attacks between access users of the present invention will be described in detail.

[0024] still use figure 1 In the network structure diagram shown, the firewall is still set between the GGSN and the external packet data network. Such as figure 2 and image 3 As shown, the method includes the following steps:

[0025] Step 301: The access device GGSN receives the message sent by the TE uploaded by the SGSN, and the GGSN judges whether the message is sent to another access user. The destination address of the message is judged, and when it is judged that the message is sent to another user, the specified message he...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides a method for preventing attacking among access users, in which, a fire wall is set between an access device and the external packet data network, the method includes: A, the access device receives an inbound message to judge if it is one sent to another access user, if so, it sends it to the fire wall, B, the fire wall receives the message to test and filter to send the legal messages to the access device, C, the access device sends the message to related access user.

Description

technical field [0001] The invention relates to the technical field of GPRS access, in particular to a method for preventing attacks between access users. Background technique [0002] Such as figure 1 Shows the GPRS / WCDMA network structure. Among them, GGSN and SGSN are two basic devices in the core network of the GPRS / WCDMA packet domain. The main function of SGSN is to provide the access function of UTRAN / BSS, and the main function of GGSN is to serve as the gateway between the GPRS / WCDMA system and the external packet data network (PDN). The data service initiated by the access user (TE, Terminal Equipment) is accessed through the SGSN device, then sent to the GGSN, and then sent to the external packet data network through the GGSN. The process of receiving data can be regarded as the reverse process of initiating data. [0003] In order to protect access users from being attacked, a firewall (Firewall) is usually set between the GGSN and the external packet data netw...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/56H04L29/06
Inventor 王旭胡玉胜
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products