WO2011160390A1 - 代理网络设备的管理方法和*** - Google Patents

代理网络设备的管理方法和*** Download PDF

Info

Publication number
WO2011160390A1
WO2011160390A1 PCT/CN2010/079025 CN2010079025W WO2011160390A1 WO 2011160390 A1 WO2011160390 A1 WO 2011160390A1 CN 2010079025 W CN2010079025 W CN 2010079025W WO 2011160390 A1 WO2011160390 A1 WO 2011160390A1
Authority
WO
WIPO (PCT)
Prior art keywords
connection
network device
client
network
key
Prior art date
Application number
PCT/CN2010/079025
Other languages
English (en)
French (fr)
Inventor
陈栋
Original Assignee
中兴通讯股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 中兴通讯股份有限公司 filed Critical 中兴通讯股份有限公司
Publication of WO2011160390A1 publication Critical patent/WO2011160390A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/04Network management architectures or arrangements
    • H04L41/046Network management architectures or arrangements comprising network management agents or mobile agents therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/09Mapping addresses
    • H04L61/25Mapping addresses of the same type
    • H04L61/2503Translation of Internet protocol [IP] addresses
    • H04L61/2514Translation of Internet protocol [IP] addresses between local and global IP addresses
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/142Managing session states for stateless protocols; Signalling session states; State transitions; Keeping-state mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/14Session management
    • H04L67/146Markers for unambiguous identification of a particular session, e.g. session cookie or URL-encoding
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • H04L67/125Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks involving control of end-device applications over a network

Definitions

  • the present invention relates to the field of communications, and in particular, to a method and system for managing a proxy network device. Background technique
  • the Pico compact base station equipment is a civilian WIMAX communication equipment that uses a master-slave networking method.
  • a residential area is equipped with a master device, the device model is BMU (Base Station Manage Unit), and each household has a small slave device in its home.
  • the device model is BS1C-M (base station ⁇ carrier-modem) , Base Station 1 Carrier - Modem ).
  • BS1C-M base station ⁇ carrier-modem
  • Base Station 1 Carrier - Modem Base Station 1 Carrier - Modem
  • the control plane message of the device can be implemented by remote WEB mode, that is, the data query and setting of the device is completed through the IE browser.
  • the BMU device can be connected to the public network, and the BMU device can be assigned a public network IP address. By accessing the IP address, the BMU device can be accessed for data setting and query. Out, access to the BMU device is achievable with the normal WEB function, but there is difficulty in accessing the WEB of the BS1C-M device. If you configure a public network IP address for each BS1C-M device, the demand for the public network IP address will be greatly increased. For example, if a BMU device hangs 128 BS1C-M devices, the public network IP address needs. The amount is expanded by 100 times, which is inevitably a waste of public IP, and it is difficult to obtain so many IPV4 addresses in practical applications.
  • the proxy server may be implemented in a proxy manner.
  • the BMU may be used as a proxy server to establish a private network address between the BMU device and the BS1C-M device connected to the BMU device. Connection.
  • On the BMU device webpage information about all the BS1C-M devices connected to the BMU device exists. For example, on the BMU device webpage, it can be displayed as a navigation tree. All the BS1Cs connected to the BMU device are displayed in the navigation tree.
  • the user can select the BS1C-M device to log in to access the device of a certain home.
  • connection established between the IE and the BMU device does not always exist during the entire login, but the process of continuous release and reconnection. If the user is in the login state, the connection between the IE and the BMU device has been disconnected, but the IE displays the page of the BS1C-M device successfully logged into a certain home.
  • the present invention provides a management method and system for a proxy network device, which can prevent the user from being effective in the related art, because the user cannot effectively reconnect due to the difference in addresses between the primary network device and the secondary network device.
  • a method for managing a proxy network device is applied to a network including a first network device and at least one second network device that is subordinate to the first device, where the first network device is configured to implement a client to the second Access to the network device, the management method includes:
  • the first network device In a case where a first connection is established between the client and the first network device, and the first network device establishes a second connection with the second network device accessed by the client, the first network The device sends the connection information to the client;
  • the first connection is a connection based on a public network address of the first network device;
  • the second connection is a connection based on a private network address of the second network device;
  • the connection information includes the The identifier of the second network device accessed by the client;
  • the connection information sent by the client when re-accessing the second network device after the first connection is disconnected, according to which the first connection is re-established, and according to the The connection information determines a second network device accessed by the client.
  • the method further includes: releasing the first connection and the second connection if the port on the client side disconnects the first connection.
  • the method also includes: releasing the second connection if the second connection is broken.
  • the method further includes: when the first network device receives the login request message from the client, the first network device deletes the connection information corresponding to the client.
  • the method further includes:
  • the first network device calculates a first key and a second key by using the generated key material; the first network device sends the key material to the client, and the client uses the Key material calculates the first key and the second key;
  • the first network device encrypts the first data sent to the client by using the first key; the client uses the first key pair to receive the first data. Performing decryption; the client encrypts the second data sent to the first network device by using the second key; the first network device sends the received pair by using the second key The second data is decrypted.
  • the first network device is a base station control unit BMU
  • the second network device is a base station ⁇ carrier-modem BS1C-M.
  • connection information is cookie information of the client, or customized information.
  • a management system for a proxy network device is applied to a network including a first network device and at least one second network device that is subordinate to the first device, where the first network device is configured to implement a client to the second Access to the network device, the management system includes:
  • a sending module configured to establish a first connection between the client and the first network device, and establish a second connection between the first network device and a second network device accessed by the client, Sending connection information to the client;
  • the first connection is a connection based on a public network address of the first network device; the second connection is a connection based on a private network address of the second network device accessed by the client;
  • the connection information includes an identifier of the second network device that is accessed by the client, and a determining module, configured to receive, when the first connection is disconnected, when the client requests to re-access the second network device.
  • the connection information according to which the first connection is re-established, and the second network device accessed by the client is determined according to the connection information.
  • the management system further includes: a release module, configured to release the first connection and the second connection if the port on the client side disconnects the first connection; or In the event of a disconnection of the second connection, the second connection is released.
  • the management system further includes: a processing module, configured to: when the first network device receives the login request message from the client, delete the connection information corresponding to the client in the first network device .
  • the second network device is recorded by using the connection information
  • the identifier enables the client to determine the second network device that needs to be accessed when reconnecting, thereby effectively solving the problem that the client cannot continue to access the second network device after the disconnection in the related art, and the connection confusion is avoided.
  • the performance of the proxy server network and the quality of the service are effectively improved.
  • the proxy server function of the WEB can be effectively implemented in the embedded device, so that the user can access multiple network elements connected through a public network address, thereby saving Public network IP address resource.
  • FIG. 1 is a flowchart of a method for managing a proxy network device according to an embodiment of the present invention
  • FIG. 2 is a schematic structural diagram of a proxy server network according to an embodiment of the present invention
  • FIG. 4 is a management system for a proxy network device according to an embodiment of the present invention
  • Block diagram of the structure Block diagram of the structure. detailed description
  • FIG. 1 is a flowchart of a method for managing a proxy network device according to an embodiment of the present invention, the method being applied to a network including a first network device and at least one second network device subordinate to the first device, where the first network device The method is used to implement client access to the second network device. As shown in FIG. 1, the method includes the following steps:
  • Step S101 In a case where a first connection is established between the client and the first network device, and the first network device establishes a second connection with the second network device accessed by the client, the first network device sends the connection information to the client.
  • the first connection is a connection based on a public network address of the first network device (for example, may be a public network IP address), and the second connection is a private network address of the second network device based on the client access (for example,
  • the connection information may be a connection of the second network device accessed by the client, and the connection information may be a cookie information of the client, or other customized information.
  • Step S103 The first network device receives the connection information sent by the client when requesting re-access to the second network device after the first connection is disconnected, re-establishes the first connection, and determines the second network device accessed by the client according to the connection information.
  • the identifier of the second network device is recorded by using the connection information, so that the client can determine the second network device that needs to be accessed when reconnecting, thereby effectively solving the problem that the client cannot continue after the connection is disconnected in the related art.
  • the problem of accessing the second network device avoids the phenomenon of connection confusion, effectively improving the performance and service quality of the proxy server network; and, through the above processing, the proxy server function of the WEB can be effectively implemented in the embedded device, so that the user can A public network address can be used to access multiple network elements that are connected to each other, which saves a large amount of public network IP address resources.
  • the first connection and the second connection need to be released, but in the case of the disconnection of the second connection, only the second connection is released.
  • the first network device If the first network device receives the login request message from the client, the first network device deletes the connection information corresponding to the client, so as to avoid conflicts between the multiple logins.
  • the client and the first network device can negotiate the information transmission key between the two. Specifically, the first network device calculates the first key and the second key by using the generated key material; the first network device sends the key material to the client, and the client calculates the first key by using the key material. And the second key, wherein the first network device encrypts the first data sent to the client by using the first key, and the client decrypts the received first data by using the first key; The second key encrypts the second data sent to the first network device, and the first network device decrypts the received second data by using the second key.
  • the client and the first network device can be All data transmitted between them is encrypted.
  • the first network device randomly generates a key material, and calculates a first key and a second key according to the key material; the first network device uses the RSA public key to encrypt the key
  • the key material is encrypted and sent to the client, and the client decrypts the key material, and uses the key material to calculate the first key and the second key. That is, the client and the first network device respectively calculate two identical keys (ie, the first key and the second key described above), and use the calculated key to encrypt and decrypt the message.
  • the first network device encrypts data (for example, data 1) sent to the client by using the first key, and the client decrypts the encrypted data by using the first key to obtain the data (for example, the client may receive the encryption) After the data 1, the encrypted data 1 is decrypted by using the first key to obtain the data 1).
  • the client encrypts the data sent to the first network device by using the second key (for example, data 2)
  • the first network device decrypts the encrypted data by using the second key to obtain data (for example, the first network device may receive the encrypted data 2, and use the second key to decrypt the encrypted data 2, Get the data 2). In this way, the content of the cookie and other transmitted data will not be monitored by the third party, thereby effectively ensuring the security of data transmission.
  • Table 1 below is the RSA public key, which is 1024 bits (128 bytes);
  • Table 2 below is the key material generated by the first network device, the key material is 48 bytes; the first network device utilizes RSA
  • the public key encrypts the key material to obtain the ciphertext shown in Table 3 below.
  • the obtained ciphertext is also 48 bytes of data.
  • the first network device sends the ciphertext to the client, and the client decrypts the ciphertext.
  • the key material shown in FIG. 2b is obtained; the first network device and the client respectively perform the same calculation on the 48-byte key material, and the calculation formula is as follows:
  • Master_sec MD5(Key_block + SHA('A' + Key_block + ClientHello.random + ServerHello.random));
  • Key-block is the key material; 'A' is the character A of the ASCII code; ClientHello.random is the random string sent by the client, which is 4 bytes. In this example, ClientHello.random is 58 4C 98 21 ; ServerHello .random is sent for the first network device A random string of 4 bytes. In this example, ServerHello.random is 37 29 B3 10; MD5 is a random hash algorithm that outputs 16 bytes of content; SHA is a secure hash algorithm, output 20 bytes of content.
  • the first key is C3 F2 F4 97 46 58 3F 6C;
  • the second key is 33 29 3F 4C 3F 60 4E 2A.
  • FIG. 2 is a schematic diagram of a proxy server network (e.g., may be a WEB proxy server) connected to a terminal.
  • a proxy server network e.g., may be a WEB proxy server
  • the IE browser, the BMU device, and multiple BS1C-M devices for example, N BS1C-M devices connected to the BMU device are included.
  • the process of the WEB proxy is described.
  • the public network address of the BMU device is shown (ie, for the client side, the address that can be seen is the BMU device. Public network address), so when the WEB access is performed through the public network, the user first logs in to the BMU device through the browser, and a TCP connection between the IE browser and the BMU device is established (ie, corresponding to the above). The first connection).
  • the BMU device webpage On the BMU device webpage, information about all the BS1C-M devices connected to the BMU device exists. For example, on the BMU device webpage, it can be displayed as a navigation tree. All the BS1Cs connected to the BMU device are displayed in the navigation tree.
  • the M device the user can select the BS1C-M device to log in to access the device of a certain home.
  • a BS1C-M device for example, BS1C-M 7
  • a TCP connection between the BMU device and BS1C-M 7 is established (ie, corresponding to the second described above). Connection), the IP address of the TCP connection is not the IP of the public network, but the private IP address of the LAN.
  • a "many-to-many" connection relationship is established, that is, an IE device and the BMU device are established.
  • N connections with the public network address as the IP address, and the BMU device and the attached BS 1 CM device establish N private network addresses as IP addresses.
  • the BMU device has a mapping relationship to the connection. That is, the TCP connection between a client and the BMU device necessarily corresponds to a connection from the BMU device to the BS1C-M device.
  • the client and the BS1C-M device perform the connection through the connection.
  • the transmission of data that is, the data read from this connection, is sent to the corresponding connection, and the data returned from the BS1C-M device is also forwarded to the corresponding client.
  • a TCP connection is established between the IE browser and the BMU device.
  • the BMU device identifies the BS1C-M device (for example, the system number of the BS1C-M device).
  • the server can set any data in the cookie, the same browser will carry the cookie data to access the server within a certain period of time.
  • the BMU device can obtain the private network IP address of the BS1C-M device through the system number, and perform TCP connection with the BS1C-M device through the private network IP address.
  • the BMU device When logging in to the BS1C-M device through the navigation tree for the first time, the BMU device writes the system number of the BS1C-M device to the cookie and sends it to the IE browser, if the TCP connection between the IE browser and the BMU device Automatically disconnect, and re-establish a TCP connection, the IE browser will send the system number of the BS1C-M device to the BMU device in the cookie, and the BMU device will determine the BS1C-M device corresponding to the system number, thus, the BMU device Each time you judge the data in the cookie, you can know the current connected BS 1 CM device. Process. As shown in Figure 3, the following processes are specifically included:
  • Step S301 after the agent process of the BMU device receives the newly received message, analyzes whether it is a login request message (may also determine whether it is a login page), and if it is a login request message, performs step S302, otherwise Go to step S306;
  • Step S302 the original cookie is deleted, thereby preventing the original cookie data from affecting the current login, and executing step S303;
  • Step S303 it is determined whether the local connection is established, if it has been established, step S305 is performed, otherwise step S304 is performed;
  • Step S304 establishing a local connection, and executing step S305;
  • Step S305 the data is delivered to the local connection, and the processing ends;
  • Step S306 determining whether the current operation is a new login operation. If it is not a new login operation, it indicates that the data is the data of the established connection for transfer, that is, in this step, the reception may be performed. The data is parsed. After parsing, the following two situations will occur: Case 1, if it is determined that this time is the first login, there is a system number in the URL, and step S307 is performed; Case 2, if it is determined that this time is not the first login, , if the login has succeeded before, there is a system number in the cookie, and step S308 is performed;
  • Step S309 the private network IP address is obtained by the system number, and step S310 is performed;
  • step S307 and step S308 are performed by performing step S307 and step S308,
  • Step S310 determining whether a connection has been established with the IP address, if the determination is yes, executing step S312, otherwise performing step S311;
  • Step S311 establishing a connection with the IP, and performing step S312;
  • Step S312 the data is delivered to the connection, and the process ends.
  • step S307 By performing step S307 to step S312, it is possible to obtain the private network address of the device by reading the system number of the attached device, and then traversing the connection querying the IE end for the connection. If the connection exists, directly transmitting the data. ; if not, establish this connection; finally pass the data Delivered to this device.
  • the newly registered system number can be further written into the cookie of the IE to facilitate the next device data forwarding.
  • the processing for the port connection is as follows: If the connection of the client (IE side) port is broken, the entire connection is released, and the data of the structure is cleared. If a network element is disconnected, only the corresponding connection is released, and the entire client connection relationship is retained. That is, if the connection between a BS1C-M device and the BMU device is disconnected, only the connection is released. This connection is maintained for other connections, including the connection between the client and the BMU device and the connection between the BMU device and other BS1C-M devices.
  • connection relationship of the BMU device always exists, and is released only after the IE side is released.
  • the data transmitted in the uplink that is, the data transmitted from the IE to the BS1C-M device
  • the proxy server function of the WEB can be effectively implemented in the embedded device, and a plurality of network elements connected thereto can be accessed through a public network address, which can save a large amount of public network IP; meanwhile, due to the use of secure webpage technology ( Encrypting cookies and transmitting data) minimizes the security risks associated with the use of cookies.
  • secure webpage technology Encrypting cookies and transmitting data
  • the proxy network composed of the above BMU device and the BS1C-M device it is not necessary to reconfigure an additional WEB proxy server for each PICO system, and at the same time, it is possible to remotely access the downlink network element of the PICO device, saving a large amount. Public network address.
  • the above-described processing of the present invention can achieve similar effects for the proxy network composed of the BMU device and other devices other than the BS1C-M device.
  • FIG. 4 is a structural block diagram of a management system of a proxy network device according to an embodiment of the present invention, the management system being applied to at least one second network including a first network device and a second device a network of devices, where the first network device is used to implement client access to the second network device.
  • the management system of the proxy network device includes:
  • the sending module 41 is configured to send the connection information to the client when the first connection is established between the client and the first network device, and the first network device establishes the second connection with the second network device accessed by the client.
  • the first connection is a connection based on a public network address of the first network device
  • the second connection is a connection based on a private network address of the second network device accessed by the client
  • the connection information includes a second network accessed by the client. Identification of the equipment;
  • the determining module 42 is configured to receive connection information sent by the client when requesting re-access to the second network device after the first connection is disconnected, re-establish the first connection, and determine, according to the connection information, the second network device accessed by the client.
  • the above system further includes a release module and a processing module:
  • a release module (not shown) for releasing the first connection and the second connection in a case where the port on the client side disconnects the first connection, or in the case of disconnection of the second connection , release the second connection.
  • the processing module (not shown) is configured to delete the connection information corresponding to the client in the first network device if the first network device receives the login request message from the client.
  • the foregoing system according to the embodiment of the present invention may be separately set in the proxy server network, or some or all of the modules of the foregoing system may be integrated in the first network device, and the specific functions of the system and the executed processing process have been performed before. A detailed description is not repeated here.
  • the identifier of the second network device is recorded by using the connection information, so that the client can determine the second network device that needs to be accessed when reconnecting, thereby Effectively solve the problem that the client cannot continue to access the second network device after the disconnection in the related technology, avoiding the phenomenon of connection confusion, effectively improving the performance and service quality of the proxy server network; by the above processing, being able to be in the embedded device Effectively implement the proxy server function of WEB, enabling users to pass a public network address.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Description

代理网络设备的管理方法和*** 技术领域
本发明涉及通信领域, 尤其涉及一种代理网络设备的管理方法和***。 背景技术
Pico紧密型基站设备是一种民用的 WIMAX通讯设备, 釆用主从的组 网方式。 例如, 一个居民小区配备一个主设备, 设备型号为 BMU (基站控 制单元, Base Station Manage Unit ), 而每户的居民家中配备一个小型的从 设备,设备型号为 BS1C-M(基站壹载波- 调制解调器, Base Station 1 Carrier - Modem )。 在数据传输过程中, 所有的业务流数据通过 BMU设备传输至 BS1C-M, 业务流可以包括电话的语音信号和上网的业务数据等。
对于设备的控制面报文,可以通过远程的 WEB方式来实现, 即通过 IE 浏览器来完成对设备的数据查询和设置。 对于 BMU设备, 可以将 BMU设 备挂接在公网上, 为该 BMU设备分配一个公网的 IP地址, 通过访问该 IP 地址,都可以对该 BMU设备进行访问,进行数据的设置和查询,可以看出, 对 BMU设备的访问是普通的 WEB功能就可以实现的,但对 BS1C-M设备 的 WEB访问则存在着困难。 如果为每一个 BS1C-M设备配置一个公网的 IP地址, 对公网 IP地址的需求量会大大增加, 例如, 一个 BMU设备如果 下挂 128个 BS1C-M设备, 则公网 IP地址的需求量就扩大 100倍, 这样必 然是对公网 IP 的浪费, 而且在实际的应用中也很难获取到如此多的 IPV4 地址。
为了解决上述问题, 可以釆用代理的方式来实现代理服务器网络, 具 体地 , 可以将 BMU作为代理服务器 , 在 BMU设备和该 BMU设备下挂的 BS1C-M设备之间建立以私网地址为 IP的连接。 在 BMU设备网页上,存在有该 BMU设备下挂的所有 BS1C-M设备的 信息, 例如, 在 BMU设备网页上, 可以显示为一个导航树, 导航树内显示 该 BMU设备下挂的所有 BS1C-M设备, 用户可以选择登陆的 BS1C-M设 备, 来访问某一个家庭的设备。 但 IE和 BMU设备所建立的连接并不是在 整个的登陆期间都始终存在的, 而是不断的释放, 再连接的过程。 如果用 户处于登陆的状态, IE和 BMU设备之间的连接已经断开, 但 IE上显示成 功登陆某一个家庭的 BS1C-M设备的页面, 这时如果对 BS1C-M设备页面 进行点击操作, IE将和 BMU设备建立一个新的连接, 不同于登陆请求, 登陆请求在 BMU设备页面上进行, 用来向 BMU设备进行请求的, 而点击 操作请求是在 BS1C-M设备页面上进行的, 该请求的目的是能直接登陆到 刚刚断开的 BS1C-M设备上, 但是现在这个连接只能使用户连接到 BMU 设备上, 由于没有之前客户端登录时留下的相关信息, 网络侧所以无法知 道用户应当具体在哪个 BS1C-M设备上登陆 (即, 不能够确定连接断开前 用户登陆的 BS1C-M设备), 因此, 在第一次连接断开后, 当用户再次进行 连接时, 用户将无法将请求数据发送到正确的下挂网元设备上, 进而出现 连接混乱的问题。
除了在基于 BMU设备与 BS1C-M设备的代理网络之夕卜,对于其他存在 主从关系的代理服务器网络, 均会出现上述连接混乱的问题。
针对相关技术中由于主网络设备与从网络设备之间的地址差异导致用 户无法有效进行重新连接的问题, 目前尚未提出有效的解决方案。 发明内容
针对相关技术中由于主网络设备与从网络设备之间的地址差异导致用 户无法有效进行重新连接的问题, 本发明提出了一种代理网络设备的管理 方法和***, 能够避免相关技术中用户无法有效进行重新连接网络设备的 问题, 并且能够避免大量公网地址的占用。 为了达到上述目的, 本发明的技术方案是这样实现的:
一种代理网络设备的管理方法, 应用于包含第一网络设备和从属于第 一设备的至少一个第二网络设备的网络, 其中, 所述第一网络设备用于实 现客户端对所述第二网络设备的访问, 所述管理方法包括:
在所述客户端与所述第一网络设备之间建立第一连接、 且所述第一网 络设备与所述客户端访问的第二网络设备建立第二连接的情况下, 所述第 一网络设备将连接信息发送给所述客户端;
其中, 所述第一连接为基于所述第一网络设备的公网地址的连接; 所 述第二连接为基于所述第二网络设备的私网地址的连接; 所述连接信息中 包含所述客户端访问的所述第二网络设备的标识;
所述第一网络设备接收所述第一连接断开后由所述客户端请求重新访 问所述第二网络设备时发送的所述连接信息, 据此重新建立所述第一连接, 并根据所述连接信息确定所述客户端访问的第二网络设备。
该方法还包括: 在所述客户端侧的端口断开所述第一连接的情况下, 释放所述第一连接和所述第二连接。
该方法还包括: 在所述第二连接断开的情况下, 释放所述第二连接。 该方法还包括: 在所述第一网络设备接收到来自所述客户端的登录请 求报文的情况下, 所述第一网络设备将所述客户端对应的连接信息删除。
在所述客户端与所述第一网络设备之间建立第一连接之前, 该方法还 包括:
所述第一网络设备利用产生的密钥材料计算出第一密钥和第二密钥; 所述第一网络设备将所述密钥材料发送给所述客户端, 所述客户端利用所 述密钥材料计算出所述第一密钥和所述第二密钥;
其中, 所述第一网络设备利用所述第一密钥对发送给所述客户端的第 一数据进行加密; 所述客户端利用所述第一密钥对接收到的所述第一数据 进行解密; 所述客户端利用所述第二密钥对发送给所述第一网络设备的第 二数据进行加密; 所述第一网络设备利用所述第二密钥发对接收到的所述 第二数据进行解密。
所述第一网络设备为基站控制单元 BMU, 所述第二网络设备为基站壹 载波- 调制解调器 BS1C-M。
所述连接信息为所述客户端的 Cookie信息, 或是自定义的信息。
一种代理网络设备的管理***, 应用于包含第一网络设备和从属于第 一设备的至少一个第二网络设备的网络, 其中, 所述第一网络设备用于实 现客户端对所述第二网络设备的访问, 所述管理***包括:
发送模块, 用于在所述客户端与所述第一网络设备之间建立第一连接、 且所述第一网络设备与所述客户端访问的第二网络设备建立第二连接的情 况下, 将连接信息发送给所述客户端;
其中, 所述第一连接为基于所述第一网络设备的公网地址的连接; 所 述第二连接为基于所述客户端访问的所述第二网络设备的私网地址的连 接; 所述连接信息中包含所述客户端访问的所述第二网络设备的标识; 确定模块, 用于接收所述第一连接断开后由所述客户端请求重新访问 所述第二网络设备时发送的所述连接信息, 据此重新建立所述第一连接, 并根据所述连接信息确定所述客户端访问的第二网络设备。
该管理***还包括: 释放模块, 用于在所述客户端侧的端口断开所述 第一连接的情况下, 释放所述第一连接和所述第二连接; 或者, 用于在所 述第二连接的断开的情况下, 释放所述第二连接。
该管理***还包括: 处理模块, 用于在所述第一网络设备接收到来自 所述客户端的登录请求报文的情况下, 将所述第一网络设备中所述客户端 对应的连接信息删除。
借助于本发明的上述技术方案, 通过釆用连接信息记录第二网络设备 的标识, 使得客户端能够在重新连接时确定需要访问的第二网络设备, 从 而有效解决相关技术中连接断开后客户端无法继续进行访问第二网络设备 的问题, 避免连接混乱的现象出现, 有效提高了代理服务器网络的性能和 服务质量; 通过上述处理, 能够在嵌入式设备中有效实现 WEB的代理服务 器功能, 使得用户能够通过一个公网地址可以访问多个下挂的网元, 进而 节省公网 IP地址资源。 附图说明
图 1是根据本发明实施例的代理网络设备的管理方法的流程图; 图 2是根据本发明实施例的代理服务器网络的结构示意图; 图 4是根据本发明实施例的代理网络设备的管理***的结构框图。 具体实施方式
下面结合附图对本发明进行详细说明。
图 1 是根据本发明实施例的代理网络设备的管理方法的流程图, 该方 法应用于包含第一网络设备和从属于第一设备的至少一个第二网络设备的 网络, 其中, 第一网络设备用于实现客户端对第二网络设备的访问, 如图 1 所示, 该方法包括以下步骤:
步骤 S101 , 在客户端与第一网络设备之间建立第一连接、 且第一网络 设备与客户端访问的第二网络设备建立第二连接的情况下, 第一网络设备 将连接信息发送给客户端, 其中, 第一连接为基于第一网络设备的公网地 址(例如, 可以是公网 IP地址) 的连接, 第二连接为基于客户端访问的第 二网络设备的私网地址(例如, 可以是私网 IP地址 ) 的连接, 连接信息中 包含客户端访问的第二网络设备的标识, 该连接信息可以为客户端的 Cookie信息, 也可以是其他自定义的信息; 步骤 S103 , 第一网络设备接收第一连接断开后由客户端请求重新访问 第二网络设备时发送的连接信息, 重新建立第一连接, 并根据连接信息确 定客户端访问的第二网络设备。
借助于上述处理, 通过釆用连接信息记录第二网络设备的标识, 使得 客户端能够在重新连接时确定需要访问的第二网络设备, 从而有效解决相 关技术中连接断开后客户端无法继续进行访问第二网络设备的问题, 避免 连接混乱的现象出现, 有效提高了代理服务器网络的性能和服务质量; 并 且,通过上述处理,能够在嵌入式设备中有效实现 WEB的代理服务器功能, 使得用户能够通过一个公网地址可以访问多个下挂的网元, 进而大量节省 公网 IP地址资源。
并且, 在客户端侧的端口断开第一连接的情况下, 需要释放第一连接 和第二连接, 但在第二连接的断开的情况下, 仅释放第二连接。
如果第一网络设备接收到来自客户端的登录请求报文, 第一网络设备 会将客户端对应的连接信息删除, 以避免多次登录之间彼此出现冲突。
另外, 为了保证客户端与第一网络设备之间信息传输的安全性, 在客 户端与第一网络设备建立连接之前, 客户端与第一网络设备可以协商好二 者之间的信息传输密钥, 具体地, 第一网络设备利用产生的密钥材料计算 出第一密钥和第二密钥; 第一网络设备将密钥材料发送给客户端, 客户端 利用密钥材料计算出第一密钥和第二密钥, 其中, 第一网络设备利用第一 密钥对发送给客户端的第一数据进行加密, 客户端利用第一密钥对接收到 的第一数据进行解密; 客户端利用第二密钥对发送给第一网络设备的第二 数据进行加密, 第一网络设备利用第二密钥发对接收到的第二数据进行解 密。
例如, 由于 cookie中的信息存在被第三方监听的隐患, 导致***号、 子***号以及用户名等信息容易泄漏, 因此可以将客户端与第一网络设备 之间传输的所有数据都加密, 具体地, 第一网络设备随机产生密钥材料, 并根据此密钥材料计算出第一密钥和第二密钥; 第一网络设备利用 RSA公 钥对密钥材料进行加密后发送给客户端, 客户端解出该密钥材料, 并利用 该密钥材料也计算出第一密钥和第二密钥。 即, 客户端和第一网络设备双 方分别计算出两个相同的密钥 (即, 上述的第一密钥和第二密钥), 并利用 计算出的密钥进行报文的加密和解密。 第一网络设备利用第一密钥对发送 给客户端的数据(例如数据 1 )进行加密, 客户端利用第一密钥对加密后的 数据进行解密, 获取该数据(例如, 可以客户端接收到加密后的数据 1 , 利 用第一密钥对加密后的数据 1进行解密, 得到数据 1 ), 同样地, 客户端利 用第二密钥对发送给第一网络设备的数据进行加密 (例如数据 2 ), 第一网 络设备利用第二密钥对加密后的数据进行解密, 获取数据(例如, 可以第 一网络设备接收到加密后的数据 2 ,利用第二密钥对加密后的数据 2进行解 密, 得到数据 2 )。 这样, cookie中的内容以及其他传输的数据将无法被第 三方所监听, 从而有效保证的数据传输的安全性。
下面对第一密钥和第二密钥的计算方法进行举例说明:
下表 1是 RSA公钥, 该 RSA公钥为 1024位( 128字节); 下表 2是第 一网络设备产生的密钥材料, 该密钥材料为 48 字节; 第一网络设备利用 RSA公钥对密钥材料进行加密, 获得下表 3所示的密文, 得到的密文同样 是 48字节的数据,第一网络设备将密文发送给客户端,客户端对密文解密, 得到图 2b所示的密钥材料; 第一网络设备和客户端分别对这 48字节的密 钥材料进行同样的计算, 计算公式如下:
master— secret = MD5(Key— block + SHA('A' + Key— block + ClientHello.random + ServerHello.random));
其中, Key— block 为密钥材料; 'A'为 ASCII 码的字符 A; ClientHello.random 为客户端发送的随机字符串, 共 4 字节, 本实例中 ClientHello.random为 58 4C 98 21 ; ServerHello.random为第一网络设备发送 的随机字符串,共 4字节, 本例中 ServerHello.random为 37 29 B3 10; MD5 为釆用的随机散列算法,输出 16字节的内容; SHA为釆用的安全散列算法, 输出 20字节的内容。
第一网络设备和客户端经过计算均得到的 16字节的密钥内容(第一密 钥和第二密钥), 其中,
第一密钥为 C3 F2 F4 97 46 58 3F 6C;
第二密钥为 33 29 3F 4C 3F 60 4E 2A。
表 1
Figure imgf000010_0001
表 2
Figure imgf000010_0002
表 3 00000 01, 30, i9.: 06.: 09.: 2A,= 4&' F6- 7D- 0, 00 04 οοοοϋ 0C-' 30* OA.- IB,. 04 ' 56.· 35.,. 2E,' 30.· 03-- 02. 04.· 90 . 30.· 06.·
010h
00000 09.-' 86.-' 8,' S6i OD--' Oh- 01- 05.- 05·. 00.. 03,- S i,- 81<-' 00.. 020h:.'
下面结合图 2对本发明实施例的处理过程进行详细说明, 在以下的描 述中, 将以 IE 浏览器作为客户端、 以 BMU设备作为第一网络设备、 以 BS1C-M设备作为第二网络设备为例对本发明的方案进行解释。图 2是代理 服务器网络(例如, 可以是 WEB代理服务器)与终端连接的示意图。 如图 2所示,包括 IE浏览器、 BMU设备、以及该 BMU设备下挂的多个 BS1C-M 设备(例如, N个 BS1C-M设备)。
首先对 WEB代理的过程进行描述:对 BS 1 C-M设备进行访问时, 由于 向外所示出的只是 BMU设备的公网地址(即, 对于客户端侧, 所能见到的 地址为 BMU设备的公网地址), 所以通过公网进行 WEB访问时, 用户通 过浏览器首先会登陆到 BMU设备上, 此时会建立 IE浏览器与 BMU设备 之间的 TCP连接(即, 对应于上文所述的第一连接)。
在 BMU设备网页上,存在有该 BMU设备下挂的所有 BS1C-M设备的 信息, 例如, 在 BMU设备网页上, 可以显示为一个导航树, 导航树内显示 该 BMU设备下挂的所有 BS1C-M设备, 用户可以选择登陆的 BS1C-M设 备, 从而访问某一个家庭的设备。 当用户选择(点击)登陆某个 BS1C-M 设备 (例如, BS1C-M 7 )时, 就会建立 BMU设备和 BS1C-M 7之间的 TCP 连接(即, 对应于上文所述的第二连接), 建立该 TCP连接的 IP地址不是 公网的 IP, 而是局域网的私网 IP地址。 当有多个用户 (例如 M个用户) 同时访问 BMU设备,并通过该 BMU设备访问下挂网元时,会建立一种 "多 对多 " 的连接关系, 即 IE设备与 BMU设备之间建立 N个以公网地址为 IP 的连接, 同时 BMU设备和下挂的 BS 1 C-M设备建立 N个以私网地址为 IP 的连接。 BMU设备对这种连接存在映射关系, 也就是说, 一个客户端和 BMU设备的 TCP连接必然对应着一条从 BMU设备到 BS1C-M设备的连接, 客户端与 BS1C-M设备通过这种连接进行数据的传输, 即, 从这个连接中 读取的数据, 就被发送到对应的连接上去, 而从 BS1C-M设备返回的数据, 也被转发给相应的客户端。
IE浏览器与 BMU设备之间建立 TCP连接, 用户点击 BMU下挂的某 个 BS1C-M设备发送登陆请求时, BMU设备会将该 BS1C-M设备的标识(例 如, BS1C-M设备的***号)返回给 IE浏览器, 并将该标识保存在 cookie 中, 服务器可以在 cookie中设置任何的数据, 相同的浏览器在一定的时间 内, 都将携带 cookie数据访问服务器。 以 BS1C-M设备的***号作为标识 为例, BMU设备可以通过***号获取到 BS1C-M设备的私网 IP地址, 并 且通过该私网 IP地址来与 BS1C-M设备进行 TCP连接,当用户第一次通过 导航树登陆 BS1C-M设备时, BMU设备就将该 BS1C-M设备的***号写入 到 cookie中, 并且发送给 IE浏览器, 如果 IE浏览器与 BMU设备之间的 TCP连接自动断开, 并重新建立 TCP连接, IE浏览器就会在 cookie中将该 BS1C-M设备的***号发送给 BMU设备, BMU设备会确定该***号对应 的 BS1C-M设备, 这样, BMU设备每次通过对 cookie中的数据进行判断, 就可以知道当前的连接的 BS 1 C-M设备。 流程。 如图 3所示, 具体包括以下处理过程:
步骤 S301 , 当 BMU设备的代理进程接受到新来的报文后, 分析是否 是登陆的请求报文(也可以判断是否是登陆页面),如果是登陆的请求报文, 则执行步骤 S302, 否则执行步骤 S306;
步骤 S302, 将原来的 cookie删除, 从而避免原来的 cookie数据影响当 前的登陆, 并执行步骤 S303; 步骤 S303 ,判断本地连接是否建立,如果已经建立,则执行步骤 S305, 否则执行步骤 S304;
步骤 S304, 建立本地连接, 并执行步骤 S305;
步骤 S305, 将数据传递到本地连接, 处理结束;
步骤 S306, 判断本次操作是否是新的登陆操作, 如果不是新的登陆的 操作, 则说明这个数据是已经建立的连接进行转接的数据了, 也就是说, 在本步骤中, 可以对接收的数据进行解析, 解析后会出现如下的两种情况: 情况一,如果确定本次是首次登陆,则在 URL中有***号,执行步骤 S307; 情况二, 如果确定本次不是首次登陆, 即, 之前已经登陆成功, 则在 cookie 中有***号, 并执行步骤 S308;
步骤 S307, 读取 ULR内的***号, 并执行步骤 S309; 其中, 如果传 输的数据的 URL中有 Systemld (***号) = x x: 则说明此数据是新登陆 一个下挂设备的请求;
步骤 S308, 读取 cookie中的***号, 并执行步骤 S309; 其中, 如果传 输的数据中的 Cookie中有 Systemld (***号) = χ χ; 的数据: 则说明此 数据已连接到某一下挂网元。
步骤 S309, 由***号得到私网 IP地址, 并执行步骤 S310;
也就是说, 通过执行步骤 S307和步骤 S308,
步骤 S310, 判断是否已与此 IP地址建立连接, 如果判断为是, 则执行 步骤 S312, 否则执行步骤 S311 ;
步骤 S311 , 建立与此 IP的连接, 并执行步骤 S312;
步骤 S312, 将数据传递到该连接, 处理结束。
通过执行步骤 S307至步骤 S312, 就能够通过读取下挂设备的***号, 获取设备的私网地址, 然后遍历查询该 IE端的连接中是否有此连接, 如果 存在该连接, 则直接透传数据; 如果没有, 则建立此连接; 最后将数据传 递到此设备上。
并且, 在执行步骤 S307的情况下, 可以进一步将新登陆的***号写入 到 IE的 cookie之中, 便于下一次的设备数据转发。
此外, 在本发明的实现过程中, 对于端口连接的处理过程如下: 如果 是客户端 (IE侧)端口的连接断开, 则将整个连接释放, 清空结构体的数 据。 如果是某一网元连接断开, 只将其对应的连接的释放, 而保留整个的 客户端连接关系,即,如果某个 BS1C-M设备与 BMU设备之间的连接断开, 则仅释放该连接, 而对于其他连接(包括客户端与 BMU设备之间的连接以 及 BMU设备与其他 BS1C-M设备之间的连接 )仍旧保持。
也就是说, BMU设备的连接关系始终存在, 只有等到 IE侧释放后, 才释放。
此外, 对于上行传递的数据, 即从 IE传输到 BS1C-M设备的数据, 如 果希望成功完成传输, 一定需要有对应的连接存在, 不需要判定是否要新 建连接。 所以找到对应的连接直接釆用透传进行数据传递, 直接转发给 IE 即可。
通过上述处理, 能够在嵌入式设备中有效实现 WEB 的代理服务器功 能, 通过一个公网地址可以访问多个其下挂的网元, 能够大量节省公网 IP; 同时, 由于使用了安全网页技术(对 cookie和传输数据进行加密), 使由于 使用 cookie而带来的安全风险降到了最低点。 例如, 在上述 BMU设备和 BS1C-M设备组成的代理网络中,不需要为每一个 PICO***再配置额外的 WEB代理服务器, 同时使远程访问 PICO设备的下挂网元成为了可能, 节 省了大量的公网地址。并且,对于 BMU设备和 BS1C-M设备以外的其他设 备组成的代理网络, 本发明的上述处理同样能够达到类似的效果。
图 4是根据本发明实施例的代理网络设备的管理***的结构框图, 该 管理***应用于包含第一网络设备和从属于第一设备的至少一个第二网络 设备的网络, 其中, 第一网络设备用于实现客户端对第二网络设备的访问, 如图 4所示, 代理网络设备的管理***包括:
发送模块 41 , 用于在客户端与第一网络设备之间建立第一连接、 且第 一网络设备与客户端访问的第二网络设备建立第二连接的情况下, 将连接 信息发送给客户端, 其中, 第一连接为基于第一网络设备的公网地址的连 接, 第二连接为基于客户端访问的第二网络设备的私网地址的连接, 连接 信息中包含客户端访问的第二网络设备的标识;
确定模块 42, 用于接收第一连接断开后由客户端请求重新访问第二网 络设备时发送的连接信息, 重新建立第一连接, 并根据连接信息确定客户 端访问的第二网络设备。
进一步地, 上述***还包括释放模块和处理模块:
释放模块(图中未示出 ), 用于在客户端侧的端口断开第一连接的情况 下, 释放第一连接和第二连接, 或者, 用于在第二连接的断开的情况下, 释放该第二连接。
处理模块(图中未示出), 用于在第一网络设备接收到来自客户端的登 录请求报文的情况下, 将第一网络设备中客户端对应的连接信息删除。
根据本发明实施例的上述***可以在代理服务器网络中单独设置, 也 可以将上述***的部分或全部模块集成在第一网络设备中, 该***的具体 功能以及所执行的处理过程已经在之前进行了详细描述, 这里不再重复。
综上所述, 借助于本发明的上述技术方案, 借助于上述处理, 通过釆 用连接信息记录第二网络设备的标识, 使得客户端能够在重新连接时确定 需要访问的第二网络设备, 从而有效解决相关技术中连接断开后客户端无 法继续进行访问第二网络设备的问题, 避免连接混乱的现象出现, 有效提 高了代理服务器网络的性能和服务质量; 通过上述处理, 能够在嵌入式设 备中有效实现 WEB的代理服务器功能,使得用户能够通过一个公网地址可 以访问多个下挂的网元, 进而大量节省公网 IP地址资源; 此外, 通过引入 安全网页技术(对 cookie 和传输数据进行加密), 能够使由于使用 cookie 而带来的安全风险降到了最低点, 提高了***的安全性。
以上所述仅为本发明的较佳实施例而已, 并不用以限制本发明, 凡在 本发明的精神和原则之内, 所作的任何修改、 等同替换、 改进等, 均应包 含在本发明的保护范围之内。

Claims

权利要求书
1. 一种代理网络设备的管理方法, 应用于包含第一网络设备和从属于 第一设备的至少一个第二网络设备的网络, 其中, 所述第一网络设备用于 实现客户端对所述第二网络设备的访问, 所述管理方法包括:
在所述客户端与所述第一网络设备之间建立第一连接、 且所述第一网 络设备与所述客户端访问的第二网络设备建立第二连接的情况下, 所述第 一网络设备将连接信息发送给所述客户端;
其中, 所述第一连接为基于所述第一网络设备的公网地址的连接; 所 述第二连接为基于所述第二网络设备的私网地址的连接; 所述连接信息中 包含所述客户端访问的所述第二网络设备的标识;
所述第一网络设备接收所述第一连接断开后由所述客户端请求重新访 问所述第二网络设备时发送的所述连接信息, 据此重新建立所述第一连接, 并根据所述连接信息确定所述客户端访问的第二网络设备。
2. 根据权利要求 1所述的管理方法, 该方法还包括:
在所述客户端侧的端口断开所述第一连接的情况下, 释放所述第一连 接和所述第二连接。
3. 根据权利要求 1所述的管理方法, 该方法还包括:
在所述第二连接断开的情况下, 释放所述第二连接。
4. 根据权利要求 1所述的管理方法, 该方法还包括:
在所述第一网络设备接收到来自所述客户端的登录请求报文的情况 下, 所述第一网络设备将所述客户端对应的连接信息删除。
5. 根据权利要求 1所述的管理方法, 在所述客户端与所述第一网络设 备之间建立第一连接之前, 该方法还包括:
所述第一网络设备利用产生的密钥材料计算出第一密钥和第二密钥; 所述第一网络设备将所述密钥材料发送给所述客户端, 所述客户端利 用所述密钥材料计算出所述第一密钥和所述第二密钥;
其中, 所述第一网络设备利用所述第一密钥对发送给所述客户端的第 一数据进行加密; 所述客户端利用所述第一密钥对接收到的所述第一数据 进行解密; 所述客户端利用所述第二密钥对发送给所述第一网络设备的第 二数据进行加密; 所述第一网络设备利用所述第二密钥发对接收到的所述 第二数据进行解密。
6. 根据权利要求 1至 5中任一项所述的管理方法, 所述第一网络设备 为基站控制单元 BMU , 所述第二网络设备为基站壹载波- 调制解调器 BS1C-M。
7. 根据权利要求 1至 5中任一项所述的管理方法, 所述连接信息为所 述客户端的 Cookie信息, 或是自定义的信息。
8. 一种代理网络设备的管理***, 应用于包含第一网络设备和从属于 第一设备的至少一个第二网络设备的网络, 其中, 所述第一网络设备用于 实现客户端对所述第二网络设备的访问, 所述管理***包括:
发送模块, 用于在所述客户端与所述第一网络设备之间建立第一连接、 且所述第一网络设备与所述客户端访问的第二网络设备建立第二连接的情 况下, 将连接信息发送给所述客户端;
其中, 所述第一连接为基于所述第一网络设备的公网地址的连接; 所 述第二连接为基于所述客户端访问的所述第二网络设备的私网地址的连 接; 所述连接信息中包含所述客户端访问的所述第二网络设备的标识; 确定模块, 用于接收所述第一连接断开后由所述客户端请求重新访问 所述第二网络设备时发送的所述连接信息, 据此重新建立所述第一连接, 并根据所述连接信息确定所述客户端访问的第二网络设备。
9. 根据权利要求 8所述的管理***, 该管理***还包括:
释放模块, 用于在所述客户端侧的端口断开所述第一连接的情况下, 释放所述第一连接和所述第二连接; 或者, 用于在所述第二连接的断开的 情况下, 释放所述第二连接。
10. 根据权利要求 8或 9所述的管理***, 该管理***还包括: 处理模块, 用于在所述第一网络设备接收到来自所述客户端的登录请 求报文的情况下, 将所述第一网络设备中所述客户端对应的连接信息删除。
PCT/CN2010/079025 2010-06-25 2010-11-23 代理网络设备的管理方法和*** WO2011160390A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201010219140.X 2010-06-25
CN201010219140.XA CN102299942B (zh) 2010-06-25 2010-06-25 代理网络设备的管理方法和***

Publications (1)

Publication Number Publication Date
WO2011160390A1 true WO2011160390A1 (zh) 2011-12-29

Family

ID=45360117

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2010/079025 WO2011160390A1 (zh) 2010-06-25 2010-11-23 代理网络设备的管理方法和***

Country Status (2)

Country Link
CN (1) CN102299942B (zh)
WO (1) WO2011160390A1 (zh)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105306612A (zh) 2014-07-15 2016-02-03 中兴通讯股份有限公司 获取终端在网络中的标识的方法及管理网元
CN106330511B (zh) * 2015-06-30 2020-06-09 中兴通讯股份有限公司 网元设备及数据通信网络开通的方法
CN108632223B (zh) * 2017-03-23 2022-01-11 腾讯科技(深圳)有限公司 一种信息处理方法及电子设备

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020083342A1 (en) * 2000-12-21 2002-06-27 Webb Brian T. Systems, methods and computer program products for accessing devices on private networks via clients on a public network
CN1671137A (zh) * 2004-03-16 2005-09-21 中兴通讯股份有限公司 基于超文本传输协议的网络从设备管理的方法及***
CN101588566A (zh) * 2009-06-19 2009-11-25 中兴通讯股份有限公司 皮蜂窝基站及其提供应急服务的方法以及移动通信***

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101094104A (zh) * 2007-07-30 2007-12-26 中兴通讯股份有限公司 一种通过安全网管代理进行设备管理的方法及其装置
CN101572608B (zh) * 2009-06-17 2011-08-31 杭州华三通信技术有限公司 一次登录参数的获取方法及装置
CN101631052B (zh) * 2009-08-25 2012-09-05 杭州华三通信技术有限公司 一种检测接入终端数量的方法及装置

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20020083342A1 (en) * 2000-12-21 2002-06-27 Webb Brian T. Systems, methods and computer program products for accessing devices on private networks via clients on a public network
CN1671137A (zh) * 2004-03-16 2005-09-21 中兴通讯股份有限公司 基于超文本传输协议的网络从设备管理的方法及***
CN101588566A (zh) * 2009-06-19 2009-11-25 中兴通讯股份有限公司 皮蜂窝基站及其提供应急服务的方法以及移动通信***

Also Published As

Publication number Publication date
CN102299942B (zh) 2015-01-28
CN102299942A (zh) 2011-12-28

Similar Documents

Publication Publication Date Title
US7680878B2 (en) Apparatus, method and computer software products for controlling a home terminal
JP3263878B2 (ja) 暗号通信システム
CN101667916B (zh) 一种基于分离映射网络使用数字证书验证用户身份的方法
US7120792B1 (en) System and method for secure communication of routing messages
US20050277434A1 (en) Access controller
JP2006121510A (ja) 暗号化通信システム
JP2003051853A (ja) 通信方法及び通信装置
CN110753327A (zh) 一种基于无线自组网和LoRa的终端物联接入***
WO2011095039A1 (zh) 一种端对端会话密钥协商方法、***和装置
WO2013166696A1 (zh) 数据传输方法、***及装置
CN109698791A (zh) 一种基于动态路径的匿名接入方法
JP3296514B2 (ja) 暗号通信端末
WO2011072513A1 (zh) 交换设备间安全连接的建立方法及***
Deshmukh et al. Design of IPSec virtual private network for remote access
US10630479B2 (en) Network communication method having function of recovering terminal session
WO2011160390A1 (zh) 代理网络设备的管理方法和***
JP2005026856A (ja) リモートアクセスシステム
US20120072513A1 (en) Method and system for obtaining host identity tag
CN102469063B (zh) 路由协议安全联盟管理方法、装置及***
CN111586017A (zh) 通信用户认证的方法和装置
JP5326815B2 (ja) パケット送受信装置およびパケット送受信方法
WO2014205703A1 (zh) 一种共享接入的检测方法、设备和终端设备
WO2011143945A1 (zh) 一种端到端共享密钥的建立方法、***及装置
JP3263879B2 (ja) 暗号通信システム
CN109150661A (zh) 一种设备发现方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 10853529

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 10853529

Country of ref document: EP

Kind code of ref document: A1