Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Satellite network user violation processing method integrating access authentication and related equipment

A satellite network and access authentication technology, applied in the field of communication, can solve problems such as difficult communication at the user end, achieve the effect of reducing authentication transmission delay, alleviating the risk of single point failure and performance bottleneck

Active Publication Date: 2022-02-25
TSINGHUA UNIV
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In view of this, the present invention provides a satellite network user violation processing method combined with access authentication and related equipment, and performs access authentication and violation processing through the joint satellite network front-end satellite network base stations, so as to alleviate the central access authentication method The single point of failure risk and performance bottleneck in the satellite network center that are easy to occur, and solve the problem that it is difficult to limit the communication in a timely and effective manner when the legitimate user end violates the rules after accessing the network anonymously

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Satellite network user violation processing method integrating access authentication and related equipment
  • Satellite network user violation processing method integrating access authentication and related equipment
  • Satellite network user violation processing method integrating access authentication and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0141] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary examples do not represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present disclosure as recited in the appended claims.

[0142] The invention provides a satellite network user violation processing method combined with access authentication and related equipment.

[0143] refer to figure 1 , figure 1 It is a schematic diagram of a scenario of a satellite network user violation processing method combined with access authentication according to the present invention.

[0144] Among them, the satellite co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a satellite network user violation processing method integrating access authentication and related equipment. The method comprises the steps that: the high-frequency access authentication of a large number of user sides is completed through all satellite communication base stations at the front end of a network, so as to relieve the single-point fault risk and performance bottleneck which are easily generated by central authentication, and reduce the authentication transmission time delay; after the access authentication is passed, the user sides perform data communication through authenticated anonymous identities, and the satellite communication base stations perform violation detection and preliminary judgment on the basis of cached anonymous identities and the first parameter of a token, and processes the user sides with lower-level violation behaviors; and for the user sides with higher-level violation behaviors, after performing further violation judgment, a satellite network center calculates the real identities of the violation user sides, updates related blacklists and performs violation processing on the basis of the satellite communication base stations, so that the user access identity anonymity is ensured, the user access efficiency is improved, and violation tracing and processing can be conveniently carried out after violation behaviors are found.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a satellite network user violation processing method combined with access authentication and related equipment. Background technique [0002] With the development and wide application of communication satellite communication networks, more and more insecure factors have emerged, among which there are many cases of launching network attacks by pretending to be legitimate user identities. For this reason, before the user terminal officially accesses the satellite communication network for communication transmission of a large amount of data, two-way security access authentication is often required: on the one hand, the satellite network terminal needs to authenticate that the access is a legitimate user to protect the system security; On the other hand, the user terminal also needs to authenticate that the access is a legal satellite communication network, so as to prevent i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/084H04W12/106H04W84/06
CPCH04W12/068H04W12/084H04W12/106H04W84/06
Inventor 裴玉奎王丽敏王嘉博许晋殷柳国
Owner TSINGHUA UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products