Method, system and application for checking multicast user underling terminal device validity

A technology of terminal equipment and legitimacy, applied in the field of network communication, can solve problems such as damage to the rights and interests of legitimate multicast users, inability to identify multicast user terminal equipment, and difficulty in implementing multiple billing methods, so as to improve adaptability, prevent The effect of the problem of misappropriation of network resources

Active Publication Date: 2009-08-19
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0056] 1. Due to the limitation of the access device, the terminal device can only be distinguished from one port of the access device, such as ADSL (Asymmetric Digital Subscriber Line, asymmetric digital subscriber line), VDSL (very high speed digital subscriber ling, very high speed digital subscriber line ), GSHDSL (General Single pair High speed Digital Subscriber Line, common single pair high speed digital subscriber line), so for the situation of a plurality of terminal equipments subordinate to MODEM (modem, promptly called multicast user in the present invention), as The home gateway, that is, the multicast users form a local area network, and the access device cannot control the on-demand behavior of the terminal device, because no matter which terminal device is on-demand, the access device can only identify the multicast user, but not the group. Therefore, the access device cannot guarantee the legitimacy of the terminal equipment subordinate to the multicast user; it cannot control the number of terminal equipment subordinate to the multicast user;
[0057] 2. Since the line connected to the terminal device may be connected by an illegal user using the same or similar device, the rights and interests of the legal multicast user will be damaged, so it cannot prevent illegal users from stealing network resources;
[0058] 3. Since the access device cannot effectively identify the online status of the terminal equipment of the multicast user, usually it can only be billed according to the monthly subscription method, and it is not easy to implement multiple billing methods

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and application for checking multicast user underling terminal device validity
  • Method, system and application for checking multicast user underling terminal device validity
  • Method, system and application for checking multicast user underling terminal device validity

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0099] The core idea of ​​the present invention is: the terminal equipment subordinate to the multicast user performs PPPOE dial-up authentication. After the authentication is successful, the IGMP join message is encapsulated into a PPPOE session phase message format and sent to the access device. The IGMP join message in the phase message format determines that the terminal device sending the message is a legal terminal device.

[0100] The reasons for encapsulating the IGMP join message into the PPPOE protocol message format are:

[0101] If the IGMP join message is still sent according to the general Ethernet message, the access device does not know whether the terminal device has passed the PPPOE dial-up authentication; and the method of encapsulating the IGMP join message into the PPPOE protocol message format ensures that the terminal The device must pass PPPOE authentication, and it can be seen from this process that the IGMP join message must be encapsulated into the d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, a system, an access device and a terminal device for checking the legitimacy of a terminal device subordinate to a multicast user. The core of the method of the present invention is: the terminal equipment subordinate to the multicast user performs PPPOE dial-up authentication. After the authentication is successful, the IGMP protocol adding message is encapsulated into a PPPOE session phase message format and sent to the access device. The IGMP join message in the message format of the session phase determines that the terminal device sending the message is a legal terminal device, thus ensuring the validity of the terminal devices subordinate to the multicast user. In this method, the access device can also acquire the user's multicast authority, and implement various charging methods according to the acquired user's multicast authority and / or the online time of the terminal device joining the multicast group. The access device can also process multicast stream data packets to prevent illegal users from stealing network resources.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method, system and application for checking the legitimacy of terminal equipment subordinate to a multicast user. Background technique [0002] At present, most Internet TVs use multicast to carry out business. Using multicast can effectively control the network transmission bandwidth and reduce the load on routers. However, there is a problem of how to ensure the legality of users. [0003] At present, the common means to effectively solve the legal problems of users is to adopt the PPPOE (Point-to-Point Protocol Over Ethernet, Point-to-Point Protocol on Ethernet) protocol. The following is a brief introduction to the PPPOE protocol, and then IGMP ( Internet GroupManagement Protocol, Internet Group Management Protocol) protocol to make a brief introduction. [0004] To adopt the PPPOE protocol, we must first understand the PPP (Point-to-Point Protocol, point-to-...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/56H04L47/76
Inventor 王德义
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products