Methods for verifying the validity of an IP resource, and associated access control server, validation server, client node, relay node and computer program

A technology for verifying servers and access control, applied in the field of solutions to promote the coordination of mitigation actions and effectiveness, can solve problems such as weakening communication security, and achieve the effect of improving reliability

Active Publication Date: 2021-03-16
ORANGE SA (FR)
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0027] -Attacks aimed at weakening the security of communications or the security of terminals connected to the Internet are still possible

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Methods for verifying the validity of an IP resource, and associated access control server, validation server, client node, relay node and computer program
  • Methods for verifying the validity of an IP resource, and associated access control server, validation server, client node, relay node and computer program
  • Methods for verifying the validity of an IP resource, and associated access control server, validation server, client node, relay node and computer program

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] 5.1 General principles

[0083] The general principle of the invention is based on declaring IP resources associated with the client's domain to a server called an access control server, and on verifying the validity of these IP resources, i.e. verifying that the declared resources are in fact associated with the client domain associated with the end domain.

[0084] about figure 1 , different devices of a communication network implementing a method for verifying the validity of IP resources associated with a client domain are presented.

[0085] For example, consider a client node C1 111 belonging to the client domain 11 communicating with the access control server S14. For example, client domain 11 contains one or more machines (also referred to as nodes). In particular, the client domain includes at least one relay node R1 112 . The term "domain" is used here to refer to a group of machines or nodes that are under the responsibility of the same entity.

[0086] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method for verifying the validity of an IP resource associated with a client domain, implemented in an access control server, said method involving: receiving (23S) a list of at least one IP resource associated with said client domain, transmitted from a client node of said client domain to said access control server; selecting (24S) at least one IP resource to be validated from among said list; and checking (27S) the validity of said at least one selected IP resource.

Description

[0001] 1. Technical field [0002] The field of the invention is that of communication within a communication network, eg an IP network, especially of added-value IP services. [0003] More specifically, the present invention provides a solution for verifying the validity of IP resources associated with a domain, i.e. verifying whether an IP address, IP prefix (a set of IP addresses), a domain name, etc. are actually associated with this domain. [0004] The present invention is particularly applicable (but not exclusively) to the field of mitigating DDoS (Distributed Denial of Service, Distributed Denial of Service) attacks, especially facilitating the coordination of mitigation actions. The invention may especially be practiced before or during a mitigation procedure. [0005] 2. Background technology [0006] Existing problems in the area of ​​mitigating distributed denial-of-service attacks are described in more detail in the remainder of this document. The invention is ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
CPCH04L61/35H04L63/0245H04L63/0263H04L63/1458H04L63/1466H04L2101/695H04L63/0236H04L63/101
Inventor M.布卡戴尔C.贾克奎尼特
Owner ORANGE SA (FR)
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products