Processing

Please wait...

Settings

Settings

Goto Application

1. WO2001047179 - PREVENTION OF SPOOFING IN TELECOMMUNICATIONS SYSTEMS

Publication Number WO/2001/047179
Publication Date 28.06.2001
International Application No. PCT/FI2000/001114
International Filing Date 19.12.2000
Chapter 2 Demand Filed 21.05.2001
IPC
H04L 29/06 2006.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
H04L 29/08 2006.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
02Communication control; Communication processing
06characterised by a protocol
08Transmission control procedure, e.g. data link level control procedure
H04L 29/12 2006.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
29Arrangements, apparatus, circuits or systems, not covered by a single one of groups H04L1/-H04L27/136
12characterised by the data terminal
H04W 12/08 2009.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
08Access security
H04W 12/12 2009.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity
12Fraud detection
H04L 12/56 2006.1
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
12Data switching networks
54Store-and-forward switching systems
56Packet switching systems
CPC
H04L 61/00
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
61Network arrangements or network protocols for addressing or naming
H04L 61/35
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
61Network arrangements or network protocols for addressing or naming
35involving non-standard use of addresses for implementing network functionalities, e.g. coding subscription information within the address or functional addressing, i.e. assigning an address to a function
H04L 63/126
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
12Applying verification of the received information
126the source of the received data
H04L 63/1466
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
63Network architectures or network communication protocols for network security
14for detecting or protecting against malicious traffic
1441Countermeasures against malicious traffic
1466Active attacks involving interception, injection, modification, spoofing of data unit addresses, e.g. hijacking, packet injection or TCP sequence number attacks
H04L 69/22
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
69Application independent communication protocol aspects or techniques in packet data networks
22Header parsing or analysis
H04W 12/122
HELECTRICITY
04ELECTRIC COMMUNICATION TECHNIQUE
WWIRELESS COMMUNICATION NETWORKS
12Security arrangements; Authentication; Protecting privacy or anonymity
12Detection or prevention of fraud
121Wireless intrusion detection systems [WIDS]; Wireless intrusion prevention systems [WIPS]
122Counter-measures against attacks; Protection against rogue devices
Applicants
  • NOKIA CORPORATION [FI]/[FI] (AllExceptUS)
  • USKELA, Sami [FI]/[FI] (UsOnly)
  • JOKINEN, Hannu, T. [FI]/[FI] (UsOnly)
Inventors
  • USKELA, Sami
  • JOKINEN, Hannu, T.
Agents
  • KOLSTER OY AB
Priority Data
1999276722.12.1999FI
Publication Language English (en)
Filing Language English (EN)
Designated States
Title
(EN) PREVENTION OF SPOOFING IN TELECOMMUNICATIONS SYSTEMS
(FR) PREVENTION DE LA MYSTIFICATION DANS DES SYSTEMES DE TELECOMMUNICATION
Abstract
(EN) In a packet radio network a packet data address is activated for a terminal for transmitting data packets between the terminal and an external network. Information on the activated packet data address is stored at least in the edge nodes of the network. To prevent spoofing, i.e. misrepresentation of sender data, the method and network node of the invention comprise checking (206) in the node whether the source address of the packet transmitted from the terminal is the same as the packet data address used in the transmission of the packet or does the source address belong to a set of allowed packet data addresses. The packet is transmitted (207) from the node towards the destination address only if the addresses are identical or the source address belongs to the set of allowed packet data addresses.
(FR) Dan un réseau de radiocommunication à commutation par paquets, on active une adresse de paquets de données pour un terminal en vue de la transmission de paquets de données entre ledit terminal et un réseau extérieur. Sur l'adresse activée de données en paquets, l'information est stockée au moins dans les noeuds périphériques du réseau. Cette invention concerne une méthode et un noeud de réseau permettant d'écarter les risques de mystification, c'est-à-dire d'interprétation fausse des données envoyées. La démarche consiste à vérifier (206) au niveau du noeud que l'adresse source du paquet transmis depuis le terminal est bien la même que celle utilisée pour la transmission du paquet ou bien qu'elle fait partie d'un ensemble agréé d'adresses de données de paquets. La transmission (207) du paquet entre le noeud et l'adresse de destination ne se fait que si les adresses sont identiques ou que l'adresse source fait partie de l'ensemble agréé d'adresses susmentionné.
Latest bibliographic data on file with the International Bureau