Session maintaining method and device

A session information, pre-configured technology, applied in the field of communication, can solve problems such as poor identification and protection capabilities, and the inability of technology to effectively protect, and achieve the effect of solving poor protection capabilities

Active Publication Date: 2017-01-04
ZHEJIANG UNIVIEW TECH CO LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the proxy or bastion machine method can filter out some attack content by detecting the data sent to the target IP, it is poor in identifying and protecting against seemingly "normal" attacks such as penetration attacks
Therefore, when a malicious user attacks the target IP by infiltrating the link connected to the target IP, the relevant technologies cannot provide effective protection.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Session maintaining method and device
  • Session maintaining method and device
  • Session maintaining method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present invention. Rather, they are merely examples of apparatuses and methods consistent with aspects of the invention as recited in the appended claims.

[0036] See figure 1 , is a networking diagram of a network security system shown.

[0037] exist figure 1 The network security system shown includes a client, a switch, a server, and several security devices arranged between the server and the switch. Wherein, the plurality of security devices may all be set between the server and the switch.

[0038] Data interaction can be performed betwee...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a session maintaining method and device, and the method comprises the steps: receiving a synchronization message sent by former selected service equipment after safety equipment is switched to service equipment, wherein the synchronization message is session information of interaction between the former selected service equipment and an upstream server and a downstream client; and maintaining the session with the upstream server and the downstream client based on the session information in the synchronization message. According to the invention, the method dynamically switches a link on the basis that the upper services are not affected, thereby enable the penetration attack and other attacks against the link not to be carried out, and effectively solving a problem that the related technologies are weak in protection capability during the prevention of attacks against the link.

Description

technical field [0001] The present invention relates to the technical field of communication, in particular to a method and device for maintaining a session. Background technique [0002] With the development of IP technology, IP-based attacks are becoming more and more rampant. In order to protect against IP-based attacks, related technologies propose a proxy or a bastion machine solution from two aspects of packet detection depth and detection frequency. Although the method of proxy or adding a bastion machine can filter out some attack content by detecting the data sent to the target IP, it has poor ability to identify and protect seemingly "normal" attacks such as penetration attacks. Therefore, when a malicious user attacks the target IP by infiltrating the link connected to the target IP, the relevant technologies cannot provide effective protection. Contents of the invention [0003] In order to overcome the problems existing in the related art, the present invent...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/1441H04L65/1083H04L67/145
Inventor 周迪王军
Owner ZHEJIANG UNIVIEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products