CN106453214A - Method, device and system for testing legality of user - Google Patents

Method, device and system for testing legality of user Download PDF

Info

Publication number
CN106453214A
CN106453214A CN201510492716.2A CN201510492716A CN106453214A CN 106453214 A CN106453214 A CN 106453214A CN 201510492716 A CN201510492716 A CN 201510492716A CN 106453214 A CN106453214 A CN 106453214A
Authority
CN
China
Prior art keywords
ipv6
prefix
user terminal
aftr
gateway
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510492716.2A
Other languages
Chinese (zh)
Inventor
徐洪磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Telecom Corp Ltd
Original Assignee
China Telecom Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Telecom Corp Ltd filed Critical China Telecom Corp Ltd
Priority to CN201510492716.2A priority Critical patent/CN106453214A/en
Publication of CN106453214A publication Critical patent/CN106453214A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/28Data switching networks characterised by path configuration, e.g. LAN [Local Area Networks] or WAN [Wide Area Networks]
    • H04L12/46Interconnection of networks
    • H04L12/4633Interconnection of networks using encapsulation techniques, e.g. tunneling
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2101/00Indexing scheme associated with group H04L61/00
    • H04L2101/60Types of network addresses
    • H04L2101/618Details of network addresses
    • H04L2101/659Internet protocol version 6 [IPv6] addresses

Abstract

The invention discloses a method, a device and a system for testing the legality of a user. When receiving a tunnel building request, an AFTR gateway extracts IPv6 address prefix information from the tunnel building request, and judges whether the extracted IPv6 address prefix information is included in a local IPv6 prefix table; if the extracted IPv6 address prefix information is included in a local IPv6 prefix table, the AFTR gateway builds a corresponding tunnel; or, the AFTR gateway refuses the tunnel building request. The safety protection capability of the system can be improved effectively without modifying the existing network architecture.

Description

For checking the methods, devices and systems of user validation
Technical field
The present invention relates to the communications field, particularly to a kind of method for checking user validation, Device and system.
Background technology
In light-duty pair of traditional stack (DS-Lite) environment, user passes through B4 (Base Bridge Broadband Element, bridges wide element substantially) initiate PPP (Point to Point, point To point) connect and obtain AFTR (Address Family Transition Router, address family turns Change router) FQDN (Fully Qualified Domain Name, fully qualified domain name) domain After name, you can initiate tunnel building request to AFTR, as shown in Figure 1.And AFTR is not to next Carry out any legitimacy detection from the tunnel building request of B4, because AFTR itself adopts public network ground Location externally provides service, and this address is easy to be detected and obtains, and thus results in more severe safety Hidden danger.That is, all kinds of fraudulences will be highly susceptible to using the AFTR gateway device of public network address to attack Hit and lead to paralyse, as shown in Figure 2.
For example, user passes through CPE (Customer Premises Equipment, user side equipment) Outlet packet capturing, you can easily obtain public network IP v6 address of service (and the DS-Lite tunnel of AFTR Road end address), this address is obtained afterwards it is only necessary to be simply provided to route by disabled user, that is, Tunnel building request can be initiated to AFTR by disguise as validated user, and AFTR also can mutually should ask Ask, provide service for it.
The safe precaution ability of therefore system is badly in need of improving.
Content of the invention
The embodiment of the present invention provides a kind of methods, devices and systems for checking user validation. By using BRAS server be validated user terminal distribution IPv6 address prefix information to tunnel Road is set up request and is carried out legitimacy inspection, thus the safe precaution ability of system can be effectively improved.
According to an aspect of the present invention, provide a kind of method for checking user validation, bag Include:
When receiving tunnel building request, before extracting IPv6 address from tunnel building request Sew information;
Judge whether the IPv6 address prefix information extracting is included in local IPv6 prefix table In;
If the IPv6 address prefix information extracting includes, in local IPv6 prefix table, building Found corresponding tunnel;
If the IPv6 address prefix information extracting is not included in local IPv6 prefix table, Refusal tunnel building request.
In one embodiment, receiving BRAS server for validated user terminal distribution After IPv6 address prefix information, the IPv6 receiving address prefix information is stored in local In IPv6 prefix table.
In one embodiment, after receiving prefix removal request, accordingly legal use will be distributed to The IPv6 address prefix information of family terminal is deleted from local IPv6 prefix table, wherein BRAS Server is detecting the validated user terminal described prefix removal request of offline rear transmission.
According to a further aspect in the invention, provide a kind of AFTR for checking user validation Gateway, including receiving unit, extraction unit, recognition unit and dispensing unit, wherein:
Receiving unit, for receiving tunnel building request;
Extraction unit, for when receiving unit receives tunnel building request, asking from tunnel building IPv6 address prefix information is extracted in asking;
Recognition unit, whether the IPv6 address prefix information for judging to extract includes local IPv6 prefix table in;
Dispensing unit, for the judged result according to recognition unit, if the IPv6 address extracting Prefix information includes in local IPv6 prefix table, then setting up corresponding tunnel;If extracting IPv6 address prefix information be not included in local IPv6 prefix table, then refuse tunnel building Request.
In one embodiment, above-mentioned gateway also includes maintenance unit, wherein:
Maintenance unit, divides for validated user terminal for receiving BRAS server in receiving unit After the IPv6 address prefix information joined, the IPv6 receiving address prefix information is stored in locally IPv6 prefix table in.
In one embodiment, maintenance unit is additionally operable to receive prefix removal request in receiving unit Afterwards, the IPv6 address prefix information of corresponding validated user terminal will be distributed to before local IPv6 Sew in table and delete, wherein BRAS server is detecting described in the offline rear transmission of validated user terminal Prefix removal request.
According to a further aspect in the invention, provide a kind of system for checking user validation, bag Include AFTR gateway, BRAS server, wherein:
AFTR gateway, is the AFTR gateway that any of the above-described embodiment is related to;
BRAS server, for after the access request receiving user terminal transmission, to user Terminal carries out legitimacy inspection;If judging user terminal for validated user terminal, for user terminal Distribution IPv6 address prefix information, and the IPv6 address prefix information of distribution is sent to AFTR Gateway, so that the IPv6 address prefix information of distribution is stored in local IPv6 by AFTR gateway In prefix table.
In one embodiment, BRAS server is additionally operable to validated user terminal is detected offline Afterwards, send prefix removal request to AFTR gateway;So that AFTR gateway just distributes to phase The IPv6 address prefix information answering validated user terminal is deleted from local IPv6 prefix table.
In one embodiment, said system also includes certificate server, wherein:
The IPv6 address prefix information of distribution is sent to certificate server by BRAS service implement body;
Certificate server, for being stored in local conjunction by the IPv6 receiving address prefix information In method prefix table, also the IPv6 receiving address prefix information is transmitted to AFTR gateway.
In one embodiment, BRAS service implement body is validated user terminal is detected offline Afterwards, send prefix removal request to certificate server;
Certificate server is additionally operable to according to the prefix removal request receiving, and it is accordingly legal to distribute to The IPv6 address prefix information of user terminal is deleted from local legal prefix table, and by prefix Removal request is transmitted to AFTR gateway.
The present invention by using BRAS server be validated user terminal distribution IPv6 address before Sew information and legitimacy inspection is carried out to tunnel building request, only include in tunnel building request IPv6 address prefix includes in the local IPv6 prefix table of AFTR gateway, just sets up corresponding Tunnel, thus the safe precaution ability of system can be effectively improved.
Brief description
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will The accompanying drawing of required use in embodiment or description of the prior art is briefly described it is clear that Ground, drawings in the following description are only some embodiments of the present invention, the common skill for this area For art personnel, without having to pay creative labor, can also be obtained according to these accompanying drawings Obtain other accompanying drawings.
Fig. 1 is the schematic diagram that in prior art, validated user is reached the standard grade.
Fig. 2 is the schematic diagram of disabled user's invasion in prior art.
Fig. 3 is used for for the present invention checking the schematic diagram of one embodiment of method of user validation.
Fig. 4 is the schematic diagram of one embodiment of AFTR gateway of the present invention.
Fig. 5 is the schematic diagram of another embodiment of AFTR gateway of the present invention.
Fig. 6 is used for for the present invention checking the schematic diagram of one embodiment of system of user validation.
Fig. 7 is used for for the present invention checking the schematic diagram of another embodiment of system of user validation.
Fig. 8 is the handling process schematic diagram of accessing user terminal to network of the present invention.
The handling process that Fig. 9 receives during tunnel building request for AFTR gateway of the present invention is illustrated Figure.
Figure 10 is that handling process when BRAS server of the present invention finds that validated user is offline is shown It is intended to.
Specific embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, to the technical scheme in the embodiment of the present invention It is clearly and completely described it is clear that described embodiment is only present invention part reality Apply example, rather than whole embodiments.Description at least one exemplary embodiment is real below It is merely illustrative on border, never as any limit to the present invention and its application or use System.Based on the embodiment in the present invention, those of ordinary skill in the art are not making creative labor The every other embodiment being obtained under the premise of dynamic, broadly falls into the scope of protection of the invention.
Unless specifically stated otherwise, the part otherwise illustrating in these embodiments and the phase of step Arrangement, numerical expression and numerical value are not limited the scope of the invention.
Simultaneously it should be appreciated that for the ease of description, the chi of the various pieces shown in accompanying drawing Very little is not to draw according to actual proportionate relationship.
May not make in detail for technology, method and apparatus known to person of ordinary skill in the relevant Thin discussion, but in the appropriate case, described technology, method and apparatus should be considered to authorize to be said A part for bright book.
In all examples with discussion shown here, any occurrence should be construed as merely Exemplary, not as restriction.Therefore, the other examples of exemplary embodiment can have There are different values.
It should be noted that:Similar label and letter represent similar terms in following accompanying drawing, therefore, Once being defined in a certain Xiang Yi accompanying drawing, then do not need it is carried out in subsequent accompanying drawing Discussed further.
Fig. 3 is used for for the present invention checking the schematic diagram of one embodiment of method of user validation.As Shown in Fig. 3, the method and step of the present embodiment can be executed by AFTR gateway.
Step 301, when receiving tunnel building request, extracts from tunnel building request IPv6 address prefix information.
Step 302, judges whether the IPv6 address prefix information extracting is included in local IPv6 In prefix table.If the IPv6 address prefix information extracting includes in local IPv6 prefix table, Then execution step 303;If the IPv6 address prefix information extracting is not included in local IPv6 In prefix table, then execution step 304.
Step 303, sets up corresponding tunnel.Afterwards, other steps of the present embodiment are no longer executed.
Step 304, refusal tunnel building request.
The method for checking user validation being provided based on the above embodiment of the present invention, by profit With pre-assigned IPv6 address prefix information, legitimacy inspection is carried out to tunnel building request, only The IPv6 address prefix including in tunnel building request is included in the local IPv6 of AFTR gateway In prefix table, just set up corresponding tunnel, thus the safe precaution ability of system can be effectively improved.
Preferably, AFTR gateway can be safeguarded to local IPv6 prefix table.For example, exist After receiving the IPv6 address prefix information that BRAS server is validated user terminal distribution, will The IPv6 address prefix information receiving is stored in local IPv6 prefix table.
Additionally, after receiving prefix removal request, corresponding validated user terminal will be distributed to IPv6 address prefix information is deleted from local IPv6 prefix table, and wherein BRAS server exists The validated user terminal described prefix removal request of offline rear transmission is detected.Thus can be according to user's Upper down status adjust local IPv6 prefix table immediately.
Fig. 4 is the schematic diagram of one embodiment of AFTR gateway of the present invention.As shown in figure 4, should AFTR gateway may include receiving unit 401, extraction unit 402, recognition unit 403 and configuration Unit 404.Wherein:
Receiving unit 401, for receiving tunnel building request.
Extraction unit 402, for when receiving unit 401 receives tunnel building request, from tunnel Road is set up in request and is extracted IPv6 address prefix information.
Recognition unit 403, whether the IPv6 address prefix information for judging to extract includes In local IPv6 prefix table.
Dispensing unit 404, for the judged result according to recognition unit 403, if the IPv6 extracting Address prefix information includes in local IPv6 prefix table, then setting up corresponding tunnel;If carrying The IPv6 address prefix information taking out is not included in local IPv6 prefix table, then refuse tunnel Set up request.
The AFTR gateway for checking user validation being provided based on the above embodiment of the present invention, By using pre-assigned IPv6 address prefix information, legitimacy inspection is carried out to tunnel building request Test, the IPv6 address prefix only including in tunnel building request includes local in AFTR gateway IPv6 prefix table in, just set up corresponding tunnel, thus can effectively improve system safety prevent Model ability.
Fig. 5 is the schematic diagram of another embodiment of AFTR gateway of the present invention.With embodiment illustrated in fig. 4 Compare, in the embodiment shown in fig. 5, still further comprise maintenance unit 501.Wherein:
Maintenance unit 501, for receiving BRAS (Broadband in receiving unit 401 Remote Access Server, Broadband Remote Access Server) server is validated user terminal After the IPv6 address prefix information of distribution, the IPv6 receiving address prefix information is stored in this In the IPv6 prefix table on ground.
Preferably, maintenance unit 501 is additionally operable to receive prefix removal request in receiving unit 401 Afterwards, the IPv6 address prefix information of corresponding validated user terminal will be distributed to before local IPv6 Sew in table and delete, wherein BRAS server is detecting described in the offline rear transmission of validated user terminal Prefix removal request.
Fig. 6 is used for for the present invention checking the schematic diagram of one embodiment of system of user validation.As Shown in Fig. 6, this system may include AFTR gateway 601, BRAS server 602, wherein:
AFTR gateway 601, is the AFTR gateway that in Fig. 4 and Fig. 5, any embodiment is related to.
BRAS server 602, for after the access request receiving user terminal transmission, right User terminal carries out legitimacy inspection;If judging user terminal for validated user terminal, for user Terminal distribution IPv6 address prefix information, and the IPv6 address prefix information of distribution is sent to AFTR gateway 601, so that the IPv6 address prefix information of distribution is deposited by AFTR gateway 601 Storage is in local IPv6 prefix table.
The system for checking user validation being provided based on the above embodiment of the present invention, AFTR The IPv6 address prefix information that gateway distributes for validated user by using BRAS server is to tunnel Road is set up request and is carried out legitimacy inspection, only before the IPv6 address that tunnel building request is included Sew including in the IPv6 prefix table local in AFTR gateway, just set up corresponding tunnel, thus The safe precaution ability of system can be effectively improved.
Preferably, BRAS server 602 be additionally operable to detect validated user terminal offline after, Send prefix removal request to AFTR gateway 601;So that AFTR gateway 601 just distributes Delete from local IPv6 prefix table to the IPv6 address prefix information of corresponding validated user terminal Remove.
Further, since the requirement traced to the source, therefore can also be recorded using certificate server BRAS server is the IPv6 address prefix information of validated user terminal distribution.
Fig. 7 is used for for the present invention checking the schematic diagram of another embodiment of system of user validation.With Embodiment illustrated in fig. 6 is compared, and in the embodiment shown in fig. 7, this system may also include authentication service Device 701.Wherein:
The IPv6 address prefix information of distribution is specifically sent to certification clothes by BRAS server 602 Business device 701.
Certificate server 701, for being stored in locally the IPv6 receiving address prefix information Legal prefix table in, also the IPv6 receiving address prefix information is transmitted to AFTR gateway 601.
Preferably, certificate server 701 can for AAA (Authentication, Authorization, Accounting, checking, authorization and accounting) server.
Preferably, BRAS server 602 specifically detect validated user terminal offline after, to Certificate server 701 sends prefix removal request.
Certificate server 701 is additionally operable to according to the prefix removal request receiving, and will distribute to corresponding The IPv6 address prefix information of validated user terminal is deleted from local legal prefix table, and will Prefix removal request is transmitted to AFTR gateway 601.
For example, the interface between certificate server 701 and AFTR gateway 601 can be opened, With the method for variable update, the legal prefix table real-time synchronization in certificate server 701 is arrived The IPv6 prefix table of AFTR gateway 601.
Below by specific example, the present invention will be described.
【Embodiment one】
This embodiment is related to process when new user terminal is reached the standard grade, as shown in Figure 8.
Step 801, user terminal 1 sends access request to BRAS server.
Step 802, BRAS server receive user terminal 1 transmission access request after, Legitimacy inspection is carried out to user terminal 1.
Step 803, if judging user terminal 1 for validated user terminal, BRAS server is User terminal 1 distributes IPv6 address prefix information.
Step 804, the IPv6 address prefix information of distribution is sent to AAA by BRAS server Server.
Step 805, the IPv6 receiving address prefix information is stored in locally by certificate server Legal prefix table in.
Step 806, the IPv6 receiving address prefix information is transmitted to AFTR by certificate server Gateway.
Step 807, the IPv6 address prefix information of distribution is stored in local by AFTR gateway In IPv6 prefix table.
Step 808, BRAS server, after judging user terminal 1 for validated user terminal, leads to Cross CR (Core Router, core router) and send tunnel building request to AFTR gateway.
Step 809, AFTR gateway extracts IPv6 address prefix letter from tunnel building request Breath.
Step 810, AFTR gateway judges whether the IPv6 address prefix information extracting includes In local IPv6 prefix table.
Step 811, carries out respective handling according to judged result.
If the IPv6 address prefix information extracting includes, in local IPv6 prefix table, building Found corresponding tunnel.If before the IPv6 address prefix information extracting is not included in local IPv6 Sew in table, then the request of refusal tunnel building.
【Embodiment two】
This embodiment is related to user terminal 2 and sends place during tunnel building request to AFTR gateway Reason, as shown in Figure 9.
Step 901, user terminal 2 sends tunnel building request to AFTR gateway.
Step 902, AFTR gateway extracts IPv6 address prefix letter from tunnel building request Breath.
Step 903, AFTR gateway judges whether the IPv6 address prefix information extracting includes In local IPv6 prefix table.
Step 904, carries out respective handling according to judged result.
If the IPv6 address prefix information extracting includes, in local IPv6 prefix table, building Found corresponding tunnel.If before the IPv6 address prefix information extracting is not included in local IPv6 Sew in table, then the request of refusal tunnel building.
Thus, can effectively refuse the tunnel building request of malicious third parties transmission.
【Embodiment three】
This embodiment be related to validated user terminal offline when process, as shown in Figure 10.
Step 1001, whether BRAS server detection validated user terminal 3 is offline.
Step 1002, BRAS server detect validated user terminal 3 offline after, to AAA Server sends prefix removal request.
Step 1003, aaa server, according to the prefix removal request receiving, will distribute to phase The IPv6 address prefix information answering validated user terminal 3 is deleted from local legal prefix table.
Step 1004, prefix removal request is transmitted to AFTR gateway by aaa server.
Step 1005, AFTR gateway just distributes to the IPv6 ground of corresponding validated user terminal 3 Location prefix information is deleted from local IPv6 prefix table.
Thus, malicious third parties can be prevented effectively from using the IPv6 ground once distributing to user terminal 3 Location prefix access network.
By implementing the present invention, following beneficial effect can be obtained:
1) propose and a kind of realize IPv6 in IPv6 transition period, under the tunnel environment of light-duty pair of stack The method of user validation checking.
2) the IPv6 address prefix being distributed for validated user using BRAS server, can effective system Safe precaution ability.
3) existing network framework need not be changed, substantially can ignore time delay.
One of ordinary skill in the art will appreciate that realizing all or part step of above-described embodiment Suddenly can be completed it is also possible to the hardware being instructed correlation by program is completed by hardware, institute The program stated can be stored in a kind of computer-readable recording medium, and storage mentioned above is situated between Matter can be read only memory, disk or CD etc..
Description of the invention is given for the sake of example and description, and is not exhaustively Or limit the invention to disclosed form.Many modifications and variations are for the common skill of this area It is obvious for art personnel.Select and describe the principle that embodiment is in order to the present invention is more preferably described And practical application, and make those of ordinary skill in the art it will be appreciated that the present invention is thus design is suitable In the various embodiments with various modifications for the special-purpose.

Claims (10)

1. a kind of method for checking user validation it is characterised in that
When receiving tunnel building request, before extracting IPv6 address from tunnel building request Sew information;
Judge whether the IPv6 address prefix information extracting is included in local IPv6 prefix table In;
If the IPv6 address prefix information extracting includes, in local IPv6 prefix table, building Found corresponding tunnel;
If the IPv6 address prefix information extracting is not included in local IPv6 prefix table, Refusal tunnel building request.
2. method according to claim 1 is it is characterised in that also include:
Receiving the IPv6 address prefix information that BRAS server is validated user terminal distribution Afterwards, the IPv6 receiving address prefix information is stored in local IPv6 prefix table.
3. method according to claim 2 is it is characterised in that also include:
After receiving prefix removal request, the IPv6 ground of corresponding validated user terminal will be distributed to Location prefix information is deleted from local IPv6 prefix table, and wherein BRAS server is detecting Described prefix removal request is sent after validated user terminal is offline.
4. a kind of AFTR gateway for checking user validation is it is characterised in that include connecing Receive unit, extraction unit, recognition unit and dispensing unit, wherein:
Receiving unit, for receiving tunnel building request;
Extraction unit, for when receiving unit receives tunnel building request, asking from tunnel building IPv6 address prefix information is extracted in asking;
Recognition unit, whether the IPv6 address prefix information for judging to extract includes local IPv6 prefix table in;
Dispensing unit, for the judged result according to recognition unit, if the IPv6 address extracting Prefix information includes in local IPv6 prefix table, then setting up corresponding tunnel;If extracting IPv6 address prefix information be not included in local IPv6 prefix table, then refuse tunnel building Request.
5. gateway according to claim 4 is it is characterised in that also include maintenance unit, Wherein:
Maintenance unit, divides for validated user terminal for receiving BRAS server in receiving unit After the IPv6 address prefix information joined, the IPv6 receiving address prefix information is stored in locally IPv6 prefix table in.
6. gateway according to claim 5 it is characterised in that
Maintenance unit is additionally operable to, after receiving unit receives prefix removal request, will distribute to corresponding The IPv6 address prefix information of validated user terminal is deleted from local IPv6 prefix table, wherein BRAS server is detecting the validated user terminal described prefix removal request of offline rear transmission.
7. a kind of system for checking user validation is it is characterised in that include AFTR net Pass, BRAS server, wherein:
AFTR gateway, is the AFTR gateway that any one of claim 4-6 is related to;
BRAS server, for after the access request receiving user terminal transmission, to user Terminal carries out legitimacy inspection;If judging user terminal for validated user terminal, for user terminal Distribution IPv6 address prefix information, and the IPv6 address prefix information of distribution is sent to AFTR Gateway, so that the IPv6 address prefix information of distribution is stored in local IPv6 by AFTR gateway In prefix table.
8. system according to claim 7 it is characterised in that
BRAS server be additionally operable to detect validated user terminal offline after, to AFTR gateway Send prefix removal request;So that AFTR gateway just distributes to corresponding validated user terminal IPv6 address prefix information is deleted from local IPv6 prefix table.
9. system according to claim 8 is it is characterised in that also include certificate server, Wherein:
The IPv6 address prefix information of distribution is sent to certificate server by BRAS service implement body;
Certificate server, for being stored in local conjunction by the IPv6 receiving address prefix information In method prefix table, also the IPv6 receiving address prefix information is transmitted to AFTR gateway.
10. system according to claim 9 it is characterised in that
BRAS service implement body detect validated user terminal offline after, send out to certificate server Send prefix removal request;
Certificate server is additionally operable to according to the prefix removal request receiving, and it is accordingly legal to distribute to The IPv6 address prefix information of user terminal is deleted from local legal prefix table, and by prefix Removal request is transmitted to AFTR gateway.
CN201510492716.2A 2015-08-12 2015-08-12 Method, device and system for testing legality of user Pending CN106453214A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510492716.2A CN106453214A (en) 2015-08-12 2015-08-12 Method, device and system for testing legality of user

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510492716.2A CN106453214A (en) 2015-08-12 2015-08-12 Method, device and system for testing legality of user

Publications (1)

Publication Number Publication Date
CN106453214A true CN106453214A (en) 2017-02-22

Family

ID=58093262

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510492716.2A Pending CN106453214A (en) 2015-08-12 2015-08-12 Method, device and system for testing legality of user

Country Status (1)

Country Link
CN (1) CN106453214A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107547687A (en) * 2017-08-31 2018-01-05 新华三技术有限公司 A kind of message transmitting method and device

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1929447A (en) * 2006-06-01 2007-03-14 华为技术有限公司 Method and device for searching address prefixion and message transfer method and system
CN1980250A (en) * 2005-11-29 2007-06-13 中国移动通信集团公司 Network protocol multi-media sub-system and method for obtaining access-in point information
CN101043614A (en) * 2007-04-23 2007-09-26 中国科学院计算技术研究所 Video-on-demand method combined user IP address with user gradation
CN101547132A (en) * 2008-03-25 2009-09-30 华为技术有限公司 Method, system and device for establishing data forwarding tunnel
CN101785270A (en) * 2007-06-19 2010-07-21 松下电器产业株式会社 Access-network to core-network trust relationship detection for a mobile node
CN101902482A (en) * 2010-08-23 2010-12-01 中国电信股份有限公司 Method and system for realizing terminal security admission control based on IPv6 (Internet Protocol Version 6) automatic configuration
CN102131233A (en) * 2010-01-18 2011-07-20 中兴通讯股份有限公司 Method and device for sending data packet based on dual-stack (DS)-LITE
CN102546568A (en) * 2010-12-31 2012-07-04 华为技术有限公司 Method and device for Internet protocol (IP) terminal being accessed into network
US20120218998A1 (en) * 2011-02-28 2012-08-30 Futurewei Technologies, Inc. Multicast Support for Dual Stack-Lite and Internet Protocol Version Six Rapid Deployment on Internet Protocol Version Four Infrastructures
CN103051543A (en) * 2012-11-01 2013-04-17 广州微仕科信息技术有限公司 Route prefix processing, lookup, adding and deleting method
CN104363176A (en) * 2014-10-24 2015-02-18 杭州华三通信技术有限公司 Message control method and equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1980250A (en) * 2005-11-29 2007-06-13 中国移动通信集团公司 Network protocol multi-media sub-system and method for obtaining access-in point information
CN1929447A (en) * 2006-06-01 2007-03-14 华为技术有限公司 Method and device for searching address prefixion and message transfer method and system
CN101043614A (en) * 2007-04-23 2007-09-26 中国科学院计算技术研究所 Video-on-demand method combined user IP address with user gradation
CN101785270A (en) * 2007-06-19 2010-07-21 松下电器产业株式会社 Access-network to core-network trust relationship detection for a mobile node
CN101547132A (en) * 2008-03-25 2009-09-30 华为技术有限公司 Method, system and device for establishing data forwarding tunnel
CN102131233A (en) * 2010-01-18 2011-07-20 中兴通讯股份有限公司 Method and device for sending data packet based on dual-stack (DS)-LITE
CN101902482A (en) * 2010-08-23 2010-12-01 中国电信股份有限公司 Method and system for realizing terminal security admission control based on IPv6 (Internet Protocol Version 6) automatic configuration
CN102546568A (en) * 2010-12-31 2012-07-04 华为技术有限公司 Method and device for Internet protocol (IP) terminal being accessed into network
US20120218998A1 (en) * 2011-02-28 2012-08-30 Futurewei Technologies, Inc. Multicast Support for Dual Stack-Lite and Internet Protocol Version Six Rapid Deployment on Internet Protocol Version Four Infrastructures
CN103051543A (en) * 2012-11-01 2013-04-17 广州微仕科信息技术有限公司 Route prefix processing, lookup, adding and deleting method
CN104363176A (en) * 2014-10-24 2015-02-18 杭州华三通信技术有限公司 Message control method and equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107547687A (en) * 2017-08-31 2018-01-05 新华三技术有限公司 A kind of message transmitting method and device

Similar Documents

Publication Publication Date Title
CN106789851A (en) Auth method, system, service server and authentication server
CN104080085B (en) Wireless network access double authentication method, device and system
CN101888329B (en) Address resolution protocol (ARP) message processing method, device and access equipment
CN107517195A (en) A kind of method and apparatus of content distributing network seat offence domain name
CN107707435B (en) Message processing method and device
CN110830447A (en) SPA single packet authorization method and device
CN105578463B (en) A kind of method and device of dual link safety communication
CN107659934A (en) A kind of control method and wireless network access device of wireless network connection
CN104954508B (en) A kind of system and its auxiliary charging method for DHCP protocol auxiliary charging
CN104038424B (en) A kind of processing method and equipment of offline message
US8037516B2 (en) Authentication tokens for use in voice over internet protocol
CN108011873A (en) A kind of illegal connection determination methods based on set covering
CN108632634A (en) A kind of providing method and device of direct broadcast service
CN106453214A (en) Method, device and system for testing legality of user
CN107360178A (en) A kind of method that network access is controlled using white list
CN103051594A (en) Method, network side equipment and system of establishing end-to-end security of marked net
CN106411852A (en) Distributed terminal access control method, and apparatus
CN110290153A (en) A kind of automatic delivery method of Port Management strategy and device of firewall
CN106230640A (en) A kind of safety regulation port configuration method and equipment
CN101640689A (en) Static user access method and device thereof
CN107105430A (en) A kind of number authentication method and device
CN104244217B (en) Realize the method and system of user data real-time synchronization
CN101505478B (en) Method, apparatus and system for filtering packets
CN109040016A (en) A kind of information processing method, equipment and computer readable storage medium
CN112104611A (en) CC attack protection management method

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20170222

RJ01 Rejection of invention patent application after publication