CN102664936A - Method and device for controlling base station - Google Patents
Method and device for controlling base station Download PDFInfo
- Publication number
- CN102664936A CN102664936A CN2012101017693A CN201210101769A CN102664936A CN 102664936 A CN102664936 A CN 102664936A CN 2012101017693 A CN2012101017693 A CN 2012101017693A CN 201210101769 A CN201210101769 A CN 201210101769A CN 102664936 A CN102664936 A CN 102664936A
- Authority
- CN
- China
- Prior art keywords
- base station
- encrypted message
- ping
- password policy
- message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Landscapes
- Mobile Radio Communication Systems (AREA)
Abstract
The invention discloses a method for controlling a base station. The method comprises the following steps: receiving a PING request, extracting password information in a PING message; matching the password information with related information in a strategy pool, and carrying out corresponding operation according to the password strategy under the condition of successfully matching. The invention also discloses a device for controlling the base station. The device achieves the beneficial effects of improving the security of controlling the base station by the method for obtaining the password information from the PING message, matching with the password information in the strategy pool and carrying out the operation of controlling the base station corresponding to the password information under the condition of successfully matching.
Description
Technical field
The present invention relates to network communications technology field, relate in particular to a kind of method and device of controlling the base station.
Background technology
ICMP (Internet Control Message Protocol; Internet Control Message Protocol) is TCP/IP (Transmission Control Protocol/Internet Protocol; Transmission control protocol/Internet protocol) sub-protocol of protocol suite is used for transmitting control message between IP main frame, router.The message of network such as control messages is meant whether network is unimpeded, whether main frame can reach, whether route is available itself.
PING (Packet Internet Grope, internet packets survey meter) is used for the program of test network connection amount.PING sends an ICMP echo request message and whether receives desirable ICMP Echo Reply for destination and report.PING refers to end-to-end connection, is commonly used to the inspection as availability.The mode of ping testing network is: whether a network address, detecting the other side's network address has response and counting response time if being sent test packet.
In the prior art, the control base station mainly is the mode that gets into debugging mode or backstage access through TELNET (Telnet), serial ports.All there is certain defective in these modes, possibly be under an embargo in network environment like the port of TELNET, and Serial Port Line is not suitable for external in reality, and the mode that the backstage is inserted then needs complicated program and communication; On the other hand, the mode of traditional control base station also exists certain potential safety hazard.
Summary of the invention
Main purpose of the present invention provides a kind of method of controlling the base station, is intended to through the PING message corresponding control information imported in the base station, improves the fail safe of control base station.
The invention provides a kind of method of controlling the base station, may further comprise the steps:
The encrypted message in the PING message is extracted in receiving internet bag survey meter PING request;
Relevant information in said encrypted message and the tactful pond is mated; Under the coupling case of successful, carry out corresponding operating according to Password Policy.
Preferably, said relevant information in encrypted message and the tactful pond is mated; Under the coupling case of successful, the step of carrying out corresponding operating according to Password Policy specifically comprises:
Relevant information in said encrypted message and the tactful pond is mated;
Judge whether said encrypted message coupling is successful; If, then write down said encrypted message, carry out the Password Policy coupling;
Judge whether said Password Policy coupling is successful;
Under said Password Policy coupling case of successful,, carry out corresponding operating according to Password Policy.
Preferably, said reception PING request, the step of extracting the encrypted message in the PING message also comprises step before:
PING is carried out in the base station to be handled.
Preferably, said step is carried out also comprising before the PING processed steps in the base station:
The allocation of code strategy produces tactful pond.
Preferably, said tactful pond comprises the Password Policy that the base station is all; Said Password Policy is the encrypted message that is associated and the combination of said encrypted message control information corresponding.
The present invention also provides a kind of device of controlling the base station, comprising:
Information extraction modules is used to receive the PING request, extracts the encrypted message in the PING message;
The information matches module is used for said encrypted message and tactful pond relevant information are mated; Under the coupling case of successful, carry out corresponding operating according to Password Policy.
Preferably, said information matches module specifically comprises:
The encrypted message matching unit is used for said encrypted message and tactful pond relevant information are mated;
The match information judging unit is used to judge whether said encrypted message coupling is successful; If, then write down said encrypted message, carry out the Password Policy coupling;
The matching strategy judging unit is used to judge whether said Password Policy coupling is successful; Under said Password Policy coupling case of successful,, carry out corresponding operating according to Password Policy.
Preferably, the device of said control base station also comprises:
Base station processing module is used for that PING is carried out in the base station and handles.
Preferably, the device of said control base station also comprises:
The policy configurations module is used for the allocation of code strategy, produces tactful pond.
Preferably, said tactful pond comprises the Password Policy that the base station is all; Said Password Policy is the encrypted message that is associated and the combination of said encrypted message control information corresponding.
The present invention is through obtaining encrypted message and being complementary with encrypted message in the tactful pond from the PING message; Under the coupling case of successful; Carry out the method for operating of the pairing control of said encrypted message base station, realized improving the beneficial effect of control base station fail safe.
Description of drawings
Fig. 1 is the method first embodiment schematic flow sheet that the present invention controls the base station;
Fig. 2 is that the present invention controls in the method for base station relevant information in said encrypted message and the tactful pond is mated; Under the coupling case of successful, carry out corresponding operating one embodiment schematic flow sheet according to Password Policy;
Fig. 3 is that the present invention controls the whole schematic flow sheet that the PING message is handled in the method for base station;
Fig. 4 is the method second embodiment schematic flow sheet that the present invention controls the base station;
Fig. 5 is method the 3rd embodiment schematic flow sheet that the present invention controls the base station;
Fig. 6 is the device first example structure sketch map that the present invention controls the base station;
Fig. 7 is that the present invention controls information matches module one example structure sketch map in the device of base station;
Fig. 8 is the device second example structure sketch map that the present invention controls the base station;
Fig. 9 is device the 3rd example structure sketch map that the present invention controls the base station.
The realization of the object of the invention, functional characteristics and advantage will combine embodiment, further specify with reference to accompanying drawing.
Embodiment
Further specify technical scheme of the present invention below in conjunction with Figure of description and specific embodiment.Should be appreciated that specific embodiment described herein only in order to explanation the present invention, and be not used in qualification the present invention.
With reference to Fig. 1, Fig. 1 is the method first embodiment schematic flow sheet that the present invention controls the base station.As shown in Figure 1, the method that the present invention controls the base station may further comprise the steps:
The encrypted message in the PING message is extracted in step S01, reception PING request;
The base station obtains password unit after receiving PING request from the PING message, a plurality of continuous PING messages can obtain encrypted message, thereby matees with encrypted message in the tactful pond.In a preferred embodiment, said password unit refers to the information that single PING message is contained, like the message number of PING message length, accumulative total etc.
Step S02, relevant information in said encrypted message and the tactful pond is mated; Under the coupling case of successful, carry out corresponding operating according to Password Policy.
With reference to Fig. 2, Fig. 2 is that the present invention controls in the method for base station relevant information in said encrypted message and the tactful pond is mated; Under the coupling case of successful, carry out corresponding operating one embodiment schematic flow sheet according to Password Policy; As shown in Figure 2, the present invention controls in the method for base station, and step S02 specifically comprises:
Step S021, relevant information in said encrypted message and the tactful pond is mated;
Step S022, judge the whether success of said encrypted message coupling; If, execution in step S023 then; If not, execution in step S024 then;
Step S023, write down said encrypted message, carry out the Password Policy coupling;
Step S024, transmission PING reply;
Whether all encrypted messages have coupling in encrypted message that judgement is obtained from the PING message and the tactful pond; If have encrypted message to be hit in the tactful pond, promptly have with the said encrypted message that from the PING message, obtains to be complementary, then write down said encrypted message, carry out the Password Policy coupling simultaneously; If said encrypted message does not mate success, then handle, and send corresponding PING and reply according to common PING message.
Step S025, judge the whether success of said Password Policy coupling; If, execution in step S026 then; As not, then return execution in step S024,
Step S024, transmission PING reply;
Step S026, according to Password Policy, carry out corresponding operating.
After the encrypted message in encrypted message that from the PING message, obtains and the tactful pond matees successfully, write down said encrypted message, and carry out the Password Policy coupling.In a preferred embodiment; Said concise and to the point process of carrying out Password Policy coupling is: judge all included in Password Policy encrypted messages whether have with the PING message in the consistent encrypted message of encrypted message that obtains; If exist; Then said Password Policy matees successfully, the base station according in the Password Policy with the encrypted message control information corresponding, operate accordingly; If in the said Password Policy included all encrypted messages all with the PING message in the encrypted message that obtains inconsistent, then said password matching gets nowhere, processing is replied accordingly according to common PING message in the base station.
With reference to Fig. 3, Fig. 3 is that the present invention controls the whole schematic flow sheet that the PING message is handled in the method for base station.As shown in Figure 3, the present invention imports corresponding information through the PING message information to the base station, thereby reaches the purpose of control base station.
In a preferred embodiment, said encrypted message is made up of a plurality of passwords unit, generally is that contained password unit can form an encrypted message in the continuous PING message.Can be defined as an encrypted message like " N continuous is individual, size is the PING message of xBYTE (byte) "; Or " N continuous, size be the PING message of x BYTE, and then are continuous N, big or smallly are the PING message of y BYTE " made up and can be defined as an encrypted message.Encrypted message can respective base station a function or a special operational.
The method that the present invention controls the base station is through obtaining encrypted message and being complementary with encrypted message in the tactful pond from the PING message; Under the coupling case of successful; Carry out the method for operating of the pairing control of said encrypted message base station, realized improving the beneficial effect of control base station fail safe.
With reference to Fig. 4, Fig. 4 is the method second embodiment schematic flow sheet that the present invention controls the base station.As shown in Figure 4, the present invention controls the method for base station in step S01, reception PING request, and the encrypted message that extracts in the PING message also comprises step before:
Step S11, PING is carried out in the base station handle.
In a preferred embodiment, handle through PING being carried out in the base station with the continuous terminal of PC (Personal Computer, PC), specify the message size and corresponding message amount of each PING bag.The order operation of serial-port that said PING can carry through the terminal also can be carried out through batch processing mode.
The method that the present invention controls the base station is through carrying out PING and handle, from the PING message, obtain encrypted message and being complementary with encrypted message in the tactful pond to the base station; Under the coupling case of successful; Carry out the method for operating of the pairing control of encrypted message base station, realized improving the beneficial effect of control base station fail safe.
With reference to Fig. 5, Fig. 5 is method the 3rd embodiment schematic flow sheet that the present invention controls the base station.As shown in Figure 5, the method that the present invention controls the base station also comprised step before step S11:
S21, allocation of code strategy produce tactful pond.
Said Password Policy is the encrypted message that is associated and the combination of said encrypted message control information corresponding.In a preferred embodiment, the definition encrypted message is " in 3 minutes, receive that length is 111,222,333 respectively, 4 continuous PING request messages of 444BYTE length "; With said encrypted message control information corresponding be " carrying out active and standby plate information synchronization ", then said Password Policy is " in 3 minutes, receive that length is respectively 111; 222; 333,4 continuous PING request messages of 444BYTE length carry out active and standby plate information synchronization ".In a preferred embodiment, said encrypted message control information corresponding can be defined as the password action.The corresponding password action of encrypted message, i.e. a base stations control action.Said password action can be to open certain function or accomplish certain operation, also can be to send certain incident to other processes, triggers concrete action and implements.As restart certain process, change to certain version, carry out masterslave switchover or configuration synchronization etc., can be defined as a password action.The content of said password action also can be orientated as and notify other processes, encrypted message to compare successful incident.
In a preferred embodiment, Password Policy can be handled static defining on the level at PING, also can carry out dynamic registration from other processes and generate.Said tactful pond comprises the Password Policy that the base station is all.
The method that the present invention controls the base station through the allocation of code strategy, produce tactful pond; PING is carried out in the base station to be handled, from the PING message, obtains encrypted message and be complementary with encrypted message in the tactful pond; Under the coupling case of successful; Carry out the method for operating of the pairing control of encrypted message base station, realized improving the beneficial effect of control base station fail safe.
With reference to Fig. 6, Fig. 6 is the device first example structure sketch map that the present invention controls the base station.As shown in Figure 6, the device that the present invention controls the base station comprises:
With reference to Fig. 7, Fig. 7 is that the present invention controls information matches module one example structure sketch map in the device of base station.As shown in Figure 7, the present invention controls in the device of base station, and information matches module 02 specifically comprises:
Encrypted message matching unit 021 is used for said encrypted message and tactful pond relevant information are mated:
Match information judging unit 022 is used to judge whether said encrypted message coupling is successful; If, then write down said encrypted message, carry out the Password Policy coupling;
Matching strategy judging unit 023 is used to judge whether said Password Policy coupling is successful; Under said Password Policy coupling case of successful,, carry out corresponding operating according to Password Policy.
All encrypted messages mate in encrypted message that encrypted message matching unit 021 will obtain from the PING message and the tactful pond, and match information judging unit 022 judges whether the relevant information in said encrypted message and tactful pond has coupling; If have encrypted message to be hit in the tactful pond, promptly have with the said encrypted message that from the PING message, obtains to be complementary, then the said encrypted message of match information judging unit 022 record carries out the Password Policy coupling simultaneously; If said encrypted message does not mate success, then handle, and send corresponding PING and reply according to common PING message.
After match information judging unit 022 judges that the encrypted message that from the PING message, obtains matees successfully with the encrypted message in the tactful pond, write down said encrypted message, matching strategy judging unit 023 carries out Password Policy and matees.In a preferred embodiment; The concise and to the point process that said matching strategy judging unit 023 carries out Password Policy coupling is: judge all included in Password Policy encrypted messages whether have with the PING message in the consistent encrypted message of encrypted message that obtains; If exist; Then said Password Policy matees successfully, the base station according in the Password Policy with the encrypted message control information corresponding, operate accordingly; If in the said Password Policy included all encrypted messages all with the PING message in the encrypted message that obtains inconsistent, then said password matching gets nowhere, processing is replied accordingly according to common PING message in the base station.
The device that the present invention controls the base station is through obtaining encrypted message and being complementary with encrypted message in the tactful pond from the PING message; Under the coupling case of successful; Carry out the method for operating of the pairing control of said encrypted message base station, realized improving the beneficial effect of control base station fail safe.
With reference to Fig. 8, Fig. 8 is the device second example structure sketch map that the present invention controls the base station.As shown in Figure 8, the device that the present invention controls the base station also comprises:
Base station processing module 03 is used for that PING is carried out in the base station and handles.
The PING processing is carried out in 03 pair of base station of base station processing module, in a preferred embodiment, handles through with the continuous terminal of PC (Personal Computer, PC) PING being carried out in the base station, specifies the message size and corresponding message amount of each PING bag.The order operation of serial-port that said PING can carry through the terminal also can be carried out through batch processing mode.
The device that the present invention controls the base station is through carrying out PING and handle, from the PING message, obtain encrypted message and being complementary with encrypted message in the tactful pond to the base station; Under the coupling case of successful; Carry out the method for operating of the pairing control of encrypted message base station, realized improving the beneficial effect of control base station fail safe.
With reference to Fig. 9, Fig. 9 is device the 3rd example structure sketch map that the present invention controls the base station.As shown in Figure 9, the device that the present invention controls the base station also comprises:
In a preferred embodiment, policy configurations module 04 can be handled static defining Password Policy on the level at PING, also can carry out dynamic registration from other processes and generate Password Policy.Said tactful pond comprises the Password Policy that the base station is all.
The device that the present invention controls the base station through the allocation of code strategy, produce tactful pond; PING is carried out in the base station to be handled, from the PING message, obtains encrypted message and be complementary with encrypted message in the tactful pond; Under the coupling case of successful; Carry out the method for operating of the pairing control of encrypted message base station, realized improving the beneficial effect of control base station fail safe.
The above is merely the preferred embodiments of the present invention; Be not so limit its claim; Every equivalent structure or equivalent flow process conversion that utilizes specification of the present invention and accompanying drawing content to be done; Directly or indirectly be used in other relevant technical fields, all in like manner be included in the scope of patent protection of the present invention.Simultaneously, control method of the present invention is not limited to control the base station, and the equipment of all supported protocol programmed process can use technical scheme of the present invention to control.
Claims (10)
1. a method of controlling the base station is characterized in that, may further comprise the steps:
The encrypted message in the PING message is extracted in receiving internet bag survey meter PING request;
Relevant information in said encrypted message and the tactful pond is mated; Under the coupling case of successful, carry out corresponding operating according to Password Policy.
2. the method for control according to claim 1 base station is characterized in that, said relevant information in encrypted message and the tactful pond is mated; Under the coupling case of successful, the step of carrying out corresponding operating according to Password Policy specifically comprises:
Relevant information in said encrypted message and the tactful pond is mated;
Judge whether said encrypted message coupling is successful; If, then write down said encrypted message, carry out the Password Policy coupling;
Judge whether said Password Policy coupling is successful;
Under said Password Policy coupling case of successful,, carry out corresponding operating according to Password Policy.
3. the method for control according to claim 1 base station is characterized in that, said reception PING request, and the step of extracting the encrypted message in the PING message also comprises step before:
PING is carried out in the base station to be handled.
4. the method for control according to claim 3 base station is characterized in that, said step is carried out also comprising before the PING processed steps in the base station:
The allocation of code strategy produces tactful pond.
5. according to the method for each described control base station of claim 1 to 4, it is characterized in that said tactful pond comprises the Password Policy that the base station is all; Said Password Policy is the encrypted message that is associated and the combination of said encrypted message control information corresponding.
6. a device of controlling the base station is characterized in that, comprising:
Information extraction modules is used to receive the PING request, extracts the encrypted message in the PING message;
The information matches module is used for said encrypted message and tactful pond relevant information are mated; Under the coupling case of successful, carry out corresponding operating according to Password Policy.
7. the device of control according to claim 6 base station is characterized in that, said information matches module specifically comprises:
The encrypted message matching unit is used for said encrypted message and tactful pond relevant information are mated;
The match information judging unit is used to judge whether said encrypted message coupling is successful; If, then write down said encrypted message, carry out the Password Policy coupling;
The matching strategy judging unit is used to judge whether said Password Policy coupling is successful; Under said Password Policy coupling case of successful,, carry out corresponding operating according to Password Policy.
8. the device of control according to claim 7 base station is characterized in that, also comprises:
Base station processing module is used for that PING is carried out in the base station and handles.
9. the device of control according to claim 8 base station is characterized in that, also comprises:
The policy configurations module is used for the allocation of code strategy, produces tactful pond.
10. according to the device of each described control base station of claim 6 to 9, it is characterized in that said tactful pond comprises the Password Policy that the base station is all; Said Password Policy is the encrypted message that is associated and the combination of said encrypted message control information corresponding.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210101769.3A CN102664936B (en) | 2012-04-09 | 2012-04-09 | Control method and the device of base station |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210101769.3A CN102664936B (en) | 2012-04-09 | 2012-04-09 | Control method and the device of base station |
Publications (2)
Publication Number | Publication Date |
---|---|
CN102664936A true CN102664936A (en) | 2012-09-12 |
CN102664936B CN102664936B (en) | 2016-01-20 |
Family
ID=46774345
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210101769.3A Active CN102664936B (en) | 2012-04-09 | 2012-04-09 | Control method and the device of base station |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN102664936B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104809538A (en) * | 2014-01-29 | 2015-07-29 | 携程计算机技术(上海)有限公司 | Service consultation system and method |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040235424A1 (en) * | 2003-05-20 | 2004-11-25 | Jong-Kwang Kim | System and method for controlling a mobile terminal located remote from a user |
CN101039221A (en) * | 2007-04-27 | 2007-09-19 | 华为技术有限公司 | Method for detecting fault and network equipment and network system |
CN101656801A (en) * | 2008-08-22 | 2010-02-24 | 中兴通讯股份有限公司 | Method for identifying user key-press meanings in automatic service system |
-
2012
- 2012-04-09 CN CN201210101769.3A patent/CN102664936B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20040235424A1 (en) * | 2003-05-20 | 2004-11-25 | Jong-Kwang Kim | System and method for controlling a mobile terminal located remote from a user |
CN101039221A (en) * | 2007-04-27 | 2007-09-19 | 华为技术有限公司 | Method for detecting fault and network equipment and network system |
CN101656801A (en) * | 2008-08-22 | 2010-02-24 | 中兴通讯股份有限公司 | Method for identifying user key-press meanings in automatic service system |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104809538A (en) * | 2014-01-29 | 2015-07-29 | 携程计算机技术(上海)有限公司 | Service consultation system and method |
Also Published As
Publication number | Publication date |
---|---|
CN102664936B (en) | 2016-01-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN105227383B (en) | A kind of device of network topology investigation | |
CN109495870B (en) | Bluetooth test method and device | |
CN103379009B (en) | SSL VPN communication method based on data link layers | |
CN107438074A (en) | The means of defence and device of a kind of ddos attack | |
CN105607086B (en) | A kind of automated detection method on GNSS receiver | |
CN112333019B (en) | Router configuration and test method and system and readable storage medium | |
Al-Dalky et al. | A Modbus traffic generator for evaluating the security of SCADA systems | |
CN109787849A (en) | A kind of OLT logical network test method | |
CN103368849A (en) | OAM (Operations, Administration and Management) message processing method and device | |
CN107005430A (en) | A kind of communication means based on data link layer, equipment and system | |
CN111917741B (en) | Micro-grid security defense system and method based on Dos and virtual data injection attack | |
CN108200128A (en) | A kind of remote meter reading method and system based on eLTE-IoT technologies | |
CN112165408A (en) | Test method and device for simulating client serial deployment environment | |
CN102143070B (en) | Remote traffic acquisition method, device and system | |
CN102664936A (en) | Method and device for controlling base station | |
CN107342994A (en) | Intelligent sound authentication method, intelligent sound, terminal device and system | |
CN109587204B (en) | Method and device for accessing public network and electronic equipment | |
CN109861877A (en) | A kind of distribution network terminal wireless public network communication test system based on cloud service | |
CN105391720A (en) | User terminal login method and device | |
CN103634365A (en) | Third party application platform in wireless access network and communication method thereof | |
CN113079565B (en) | LTE edge user network access method and device | |
CN102497439B (en) | Geographical position information acquisition method and intranet and extranet communicator | |
Yang et al. | Design of communication interface for M2M-based positioning and monitoring system | |
CN109286575A (en) | Message priority configuration method, device and the network equipment | |
CN212992342U (en) | Attack defense reliability test system for network solution |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant |