+

CN104380686B - Method and system for implementing NG firewall, NG firewall client and NG firewall server - Google Patents

Method and system for implementing NG firewall, NG firewall client and NG firewall server Download PDF

Info

Publication number
CN104380686B
CN104380686B CN201480001549.0A CN201480001549A CN104380686B CN 104380686 B CN104380686 B CN 104380686B CN 201480001549 A CN201480001549 A CN 201480001549A CN 104380686 B CN104380686 B CN 104380686B
Authority
CN
China
Prior art keywords
application
information
security information
terminal device
message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201480001549.0A
Other languages
Chinese (zh)
Other versions
CN104380686A (en
Inventor
山贾·库马尔·纳维
德布塔·纳亚克
章驰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority claimed from PCT/CN2014/074744 external-priority patent/WO2015066996A1/en
Publication of CN104380686A publication Critical patent/CN104380686A/en
Application granted granted Critical
Publication of CN104380686B publication Critical patent/CN104380686B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0245Filtering by information in the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • H04L63/0254Stateful filtering

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer And Data Communications (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The embodiment of the invention provides a method and a system for implementing an NG firewall, an NG firewall client and an NG firewall server. The method comprises the following steps: when the application is started in the terminal equipment configured with the NG firewall client, sending a request message for requesting security information of the application; receiving a response message containing the security information of the application; processing reception or transmission data of the application by using the security information of the application. In the invention, dynamic loading attack prevention can be realized, so that the occupied space of software required by the terminal equipment can be reduced, and the performance of the application installed on the terminal equipment can be improved.

Description

用于实施NG防火墙的方法和系统、NG防火墙客户端和NG防火 墙服务器Method and system for implementing NG firewall, NG firewall client and NG fire protection wall server

技术领域technical field

本发明涉及通信技术,尤其涉及一种用于实施NG防火墙的方法和系统、一种NG防火墙客户端以及一种NG防火墙服务器。The present invention relates to communication technology, in particular to a method and system for implementing NG firewall, an NG firewall client and an NG firewall server.

背景技术Background technique

NG防火墙(NG-FW,下一代防火墙)将安全服务统一到单一引擎中并改变接入控制和安全策略的设计。NG防火墙扩展了应用和业务流的管理。NG防火墙的功能包括:允许、拦截、记录、监控以及带宽控制等。NG Firewall (NG-FW, Next Generation Firewall) unifies security services into a single engine and changes the design of access control and security policies. NG Firewall extends the management of applications and business flows. The functions of NG firewall include: allowing, blocking, recording, monitoring and bandwidth control.

NG防火墙结合了第一代防火墙,例如,状态和无状态网络防火墙、应用防火墙、NAT-ALG(网络地址转换应用层网关)、IPS(入侵防御系统)/IDS(入侵检测系统)、反X恶意软件扫描。这种结合增加了NG防火墙的复杂性。NG防火墙的基础是对关联先前接收报文的传入和传出报文进行深度报文检测。NG Firewall combines first-generation firewalls, such as stateful and stateless network firewalls, application firewalls, NAT-ALG (Network Address Translation Application Layer Gateway), IPS (Intrusion Prevention System)/IDS (Intrusion Detection System), anti-X malicious Software scan. This combination increases the complexity of the NG firewall. The foundation of the NG firewall is deep packet inspection of incoming and outgoing packets correlated with previously received packets.

另一方面,智能手机是旅行中BYOD(携带自己的设备办公)、个人银行、社交网站和娱乐的关键推动因素。这样增加了对消费者隐私的安全威胁以及个人和商业数据的泄漏。Smartphones, on the other hand, are a key enabler of BYOD (bring your own device), personal banking, social networking and entertainment in travel. This increases security threats to consumer privacy and leakage of personal and business data.

然而,申请人发现:NG防火墙安装在具有高计算能力的专用服务器上。然而,NG防火墙还没有在智能手机等终端设备上实施。因此终端设备所需的软件占用空间没有减少,而且安装在终端设备上的应用的性能没有得到提高。However, the applicant found that the NG firewall is installed on a dedicated server with high computing power. However, NG Firewall has not yet been implemented on end devices such as smartphones. The software footprint required by the terminal device is therefore not reduced, and the performance of applications installed on the terminal device is not improved.

发明内容Contents of the invention

本发明的实施例涉及提供一种实施NG防火墙的方法和系统、一种NG防火墙客户端以及一种NG防火墙服务器,以在不影响应用层防攻击的情况下,减少终端设备上NF防火墙NG防火墙的软件占用空间。Embodiments of the present invention relate to providing a method and system for implementing an NG firewall, an NG firewall client, and an NG firewall server, so as to reduce the number of NF firewalls and NG firewalls on terminal devices without affecting the anti-attack of the application layer. software takes up space.

根据本发明的实施例的一方面,提供了一种用于实施NG防火墙(下一代防火墙)的方法,所述方法包括:According to an aspect of the embodiments of the present invention, a method for implementing an NG firewall (Next Generation Firewall) is provided, the method comprising:

当应用在终端设备中被启动时,向NG防火墙服务器发送用于请求所述应用的安全信息的请求消息;When the application is started in the terminal device, send a request message for requesting the security information of the application to the NG firewall server;

从所述NG防火墙服务器接收包含所述应用的所述安全信息的响应消息,其中所述应用的所述安全信息表示对所述终端设备中启动的所述应用作安全保护的信息;receiving a response message including the security information of the application from the NG firewall server, wherein the security information of the application represents information used as security protection for the application started in the terminal device;

通过使用所述应用的所述安全信息处理所述应用的数据。Data of the application is processed by using the security information of the application.

根据本发明的实施例的另一方面,所述请求消息包含所述应用的识别信息,以及所述应用的所述识别信息用于所述NG防火墙服务器确定所述应用的所述安全信息。According to another aspect of the embodiments of the present invention, the request message includes identification information of the application, and the identification information of the application is used by the NG firewall server to determine the security information of the application.

根据本发明的实施例的另一方面,所述方法进一步包括:According to another aspect of the embodiments of the present invention, the method further includes:

当所述应用在所述终端设备中被关闭时,清除所述应用的所述安全信息。When the application is closed in the terminal device, the security information of the application is cleared.

根据本发明的实施例的另一方面,所述响应消息进一步包括用于维护所述应用的部分或全部安全信息的一个或多个定时器值;以及According to another aspect of the embodiments of the present invention, the response message further includes one or more timer values for maintaining part or all of the security information of the application; and

所述方法进一步包括:当对应于所述应用的所述部分安全信息的所述一个或多个定时器值中的一个或多个定时器超时时,重新请求所述应用的所述部分安全信息,或The method further includes re-requesting the partial security information of the application when one or more of the one or more timer values corresponding to the partial security information of the application expires ,or

当对应于所述应用的所述全部安全信息的所述一个或多个定时器值中的一个或多个定时器超时时,重新请求所述应用的所述全部安全信息。Re-requesting the full security information of the application when one or more timers of the one or more timer values corresponding to the full security information of the application expires.

根据本发明的实施例的另一方面,所述方法进一步包括:According to another aspect of the embodiments of the present invention, the method further includes:

当对应于所述应用的所述部分安全信息的所述一个或多个定时器值中的一个或多个定时器超时时,清除所述应用的所述部分安全信息,或clearing the partial security information for the application when one or more of the one or more timer values corresponding to the partial security information for the application expires, or

当对应于所述应用的所述全部安全信息的所述一个或多个定时器值中的一个或多个定时器超时时,清除所述应用的所述全部安全信息。Clearing the entire security information of the application when one or more timers of the one or more timer values corresponding to the entire security information of the application expires.

根据本发明的实施例的另一方面,所述应用的所述安全信息包括以下信息的任意一项或组合:所述应用的报文签名信息、所述应用的接入控制列表信息、所述应用的畸形报文攻击信息、所述应用的有状态防火墙库信息以及所述应用的报文限速策略信息。According to another aspect of the embodiments of the present invention, the security information of the application includes any one or a combination of the following information: message signature information of the application, access control list information of the application, the Malformed packet attack information of the application, stateful firewall library information of the application, and packet rate limit policy information of the application.

根据本发明的实施例的另一方面,存在不同的定时器值用于保存以下信息的任意一项或组合:所述应用的报文签名信息、所述应用的接入控制列表信息、所述应用的畸形报文攻击信息、所述应用的有状态防火墙库信息以及所述应用的报文限速策略信息;或According to another aspect of the embodiments of the present invention, there are different timer values for storing any one or combination of the following information: the message signature information of the application, the access control list information of the application, the Malformed packet attack information of the application, stateful firewall library information of the application, and packet rate limit policy information of the application; or

存在相同的定时器值用于保存以下信息的任意一项或组合:所述应用的报文签名信息、所述应用的接入控制列表信息、所述应用的畸形报文攻击信息、所述应用的有状态防火墙库信息以及所述应用的报文限速策略信息。The same timer value is used to store any one or combination of the following information: message signature information of the application, access control list information of the application, malformed message attack information of the application, The stateful firewall database information and the packet rate limit policy information of the application.

根据本发明的实施例的另一方面,通过使用所述应用的所述安全信息处理所述应用的数据包括:According to another aspect of the embodiments of the present invention, processing data of the application by using the security information of the application includes:

通过使用所述应用的所述报文签名信息处理所述应用的所述数据,或processing the data of the application by using the message signature information of the application, or

通过使用所述应用的所述接入控制列表信息处理所述应用的所述数据,或processing said data of said application by using said access control list information of said application, or

通过使用所述应用的所述畸形攻击信息处理所述应用的所述数据,或processing said data of said application by using said malformed attack information of said application, or

通过使用所述应用的所述状态防火墙库信息处理所述应用的所述数据,或processing said data of said application by using said stateful firewall repository information of said application, or

通过使用所述应用的所述报文限速策略信息处理所述应用的所述数据。Processing the data of the application by using the packet rate limit policy information of the application.

根据本发明的实施例的另一方面,提供了一种用于实施NG防火墙的方法,所述方法包括:According to another aspect of the embodiments of the present invention, a method for implementing an NG firewall is provided, the method comprising:

从终端设备接收用于请求应用的安全信息的请求消息,其中所述应用的所述安全信息表示对所述终端设备中启动的所述应用作安全保护的信息;receiving a request message for requesting security information of an application from a terminal device, wherein the security information of the application represents information for security protection of the application started in the terminal device;

根据所述请求消息确定所述应用的所述安全信息;determining the security information of the application according to the request message;

向所述终端设备发送包含所述应用的所述安全信息的响应消息。Sending a response message including the security information of the application to the terminal device.

根据本发明的实施例的另一方面,所述请求消息包括所述应用的识别信息;以及According to another aspect of the embodiments of the present invention, the request message includes identification information of the application; and

根据所述请求消息确定所述应用的所述安全信息包括:根据所述请求消息中包含的所述应用的所述识别信息从数据库中获取所述应用的所述安全信息。Determining the security information of the application according to the request message includes: acquiring the security information of the application from a database according to the identification information of the application contained in the request message.

根据本发明的实施例的另一方面,在向所述终端设备发送包含所述应用的所述安全信息的响应消息之前,所述方法进一步包括:According to another aspect of the embodiments of the present invention, before sending a response message including the security information of the application to the terminal device, the method further includes:

认证所述请求消息是否有效;authenticating whether the request message is valid;

当所述请求消息有效时,执行向所述终端设备发送所述包含所述应用的所述安全信息的响应消息的过程。When the request message is valid, the process of sending the response message including the security information of the application to the terminal device is performed.

根据本发明的实施例的另一方面,所述方法进一步包括:According to another aspect of the embodiments of the present invention, the method further includes:

确定用于维护所述应用的部分或全部安全信息的一个或多个定时器值;determining one or more timer values for maintaining some or all of the security information for the application;

所述向所述终端设备发送包含所述应用的所述安全信息的响应消息包括:发送包含所述应用的所述安全信息的响应消息,以及用于维护所述应用的部分或全部安全信息的一个或多个定时器值给所述终端设备。The sending a response message including the security information of the application to the terminal device includes: sending a response message including the security information of the application, and a message for maintaining part or all of the security information of the application One or more timer values are given to the terminal device.

根据本发明的实施例的另一方面,所述应用的所述安全信息包括以下信息的任意一项或组合:所述应用的报文签名信息、所述应用的接入控制列表信息、所述应用的畸形报文攻击信息、所述应用的有状态防火墙库信息以及所述应用的报文限速策略信息。According to another aspect of the embodiments of the present invention, the security information of the application includes any one or a combination of the following information: message signature information of the application, access control list information of the application, the Malformed packet attack information of the application, stateful firewall library information of the application, and packet rate limit policy information of the application.

根据本发明的实施例的另一方面,提供了一种NG防火墙客户端,包括:According to another aspect of the embodiments of the present invention, an NG firewall client is provided, including:

发送单元,用于当应用在配置有NG防火墙客户端的终端设备中被启动时,向NG防火墙服务器发送用于请求所述应用的安全信息的请求消息;A sending unit, configured to send a request message for requesting security information of the application to the NG firewall server when the application is started in the terminal device configured with the NG firewall client;

接收单元,用于从所述NG防火墙服务器接收包含所述应用的所述安全信息的响应消息,其中所述应用的所述安全信息表示对所述终端设备中启动的所述应用作安全保护的信息;a receiving unit, configured to receive a response message containing the security information of the application from the NG firewall server, wherein the security information of the application represents the security protection for the application started in the terminal device information;

处理单元,用于通过使用所述应用的所述安全信息处理所述应用的数据。A processing unit for processing data of the application by using the security information of the application.

根据本发明的实施例的另一方面,所述发送单元具体用于,当应用在配置有所述NG防火墙客户端的终端设备中被启动时,向所述NG防火墙服务器发送用于请求所述应用的所述安全信息的所述请求消息;其中所述请求消息包含所述应用的识别信息,以及所述应用的所述识别信息用于所述NG防火墙服务器确定所述应用的所述安全信息。According to another aspect of the embodiments of the present invention, the sending unit is specifically configured to, when the application is started in the terminal device configured with the NG firewall client, send a request for the application to the NG firewall server The request message of the security information; wherein the request message includes identification information of the application, and the identification information of the application is used by the NG firewall server to determine the security information of the application.

根据本发明的实施例的另一方面,所述NG防火墙客户端进一步包括:According to another aspect of the embodiments of the present invention, the NG firewall client further includes:

清除单元,用于当所述应用在所述终端设备中被关闭时,清除所述应用的所述安全信息。A clearing unit, configured to clear the security information of the application when the application is closed in the terminal device.

根据本发明的实施例的另一方面,所述响应消息进一步包括用于维护所述应用的部分或全部安全信息的一个或多个定时器值;以及According to another aspect of the embodiments of the present invention, the response message further includes one or more timer values for maintaining part or all of the security information of the application; and

所述发送单元进一步用于,当对应于所述应用的所述部分安全信息的所述一个或多个定时器值中的一个或多个定时器超时时,重新请求所述应用的所述部分安全信息,或当对应于所述应用的所述全部安全信息的所述一个或多个定时器值中的一个或多个定时器超时时,重新请求所述应用的所述全部安全信息。The sending unit is further configured to re-request the part of the application when one or more of the one or more timer values corresponding to the part of security information of the application expires security information, or when one or more of the one or more timer values corresponding to the all security information of the application expires, re-requesting the all security information of the application.

根据本发明的实施例的另一方面,所述清除单元进一步用于,当对应于所述应用的所述部分安全信息的所述一个或多个定时器值中的一个或多个定时器超时时,清除所述应用的所述部分安全信息,或当对应于所述应用的所述全部安全信息的所述一个或多个定时器值中的一个或多个定时器超时时,清除所述应用的所述全部安全信息。According to another aspect of the embodiments of the present invention, the clearing unit is further configured to, when one or more timers among the one or more timer values corresponding to the partial security information of the application expires Clear the part of the security information of the application from time to time, or clear the All security information for the application.

根据本发明的实施例的另一方面,所述应用的所述安全信息包括以下信息的任意一项或组合:所述应用的报文签名信息、所述应用的接入控制列表信息、所述应用的畸形报文攻击信息、所述应用的有状态防火墙库信息以及所述应用的报文限速策略信息。According to another aspect of the embodiments of the present invention, the security information of the application includes any one or a combination of the following information: message signature information of the application, access control list information of the application, the Malformed packet attack information of the application, stateful firewall library information of the application, and packet rate limit policy information of the application.

根据本发明的实施例的另一方面,所述处理单元具体用于:According to another aspect of the embodiments of the present invention, the processing unit is specifically configured to:

通过使用所述应用的所述报文签名信息处理所述应用的所述数据,或processing the data of the application by using the message signature information of the application, or

通过使用所述应用的所述接入控制列表信息处理所述应用的所述数据,或processing said data of said application by using said access control list information of said application, or

通过使用所述应用的所述畸形攻击信息处理所述应用的所述数据,或processing said data of said application by using said malformed attack information of said application, or

通过使用所述应用的所述状态防火墙库信息处理所述应用的所述数据,或processing said data of said application by using said stateful firewall repository information of said application, or

通过使用所述应用的所述报文限速策略信息处理所述应用的所述数据。Processing the data of the application by using the packet rate limit policy information of the application.

根据本发明的实施例的另一方面,提供了一种NG防火墙服务器,包括:According to another aspect of the embodiments of the present invention, an NG firewall server is provided, including:

接收单元,用于从终端设备接收用于请求应用的安全信息的请求消息,其中所述应用的所述安全信息表示对所述终端设备中启动的所述应用作安全保护的信息;a receiving unit, configured to receive a request message for requesting security information of an application from a terminal device, wherein the security information of the application represents information for security protection of the application started in the terminal device;

第一确定单元,用于根据所述请求消息确定所述应用的所述安全信息;a first determining unit, configured to determine the security information of the application according to the request message;

发送单元,用于向所述终端设备发送包含所述应用的所述安全信息的响应消息。A sending unit, configured to send a response message including the security information of the application to the terminal device.

根据本发明的实施例的另一方面,所述请求消息包括所述应用的识别信息;以及According to another aspect of the embodiments of the present invention, the request message includes identification information of the application; and

所述第一确定单元具体用于根据所述请求消息中包含的所述应用的所述识别信息从数据库中获取所述应用的所述安全信息。The first determining unit is specifically configured to acquire the security information of the application from a database according to the identification information of the application contained in the request message.

根据本发明的实施例的另一方面,所述NG防火墙服务器进一步包括:According to another aspect of the embodiments of the present invention, the NG firewall server further includes:

认证单元,用于认证所述请求消息是否有效;以及an authentication unit, configured to authenticate whether the request message is valid; and

所述发送单元具体用于,当所述请求消息有效时,发送包含所述应用的所述安全信息的所述响应消息给所述终端设备。The sending unit is specifically configured to, when the request message is valid, send the response message including the security information of the application to the terminal device.

根据本发明的实施例的另一方面,所述NG防火墙服务器进一步包括:According to another aspect of the embodiments of the present invention, the NG firewall server further includes:

第二确定单元,用于确定用于维护所述应用的部分或全部安全信息的一个或多个定时器值;a second determining unit, configured to determine one or more timer values for maintaining part or all of the security information of the application;

所述发送单元具体用于发送包含所述应用的所述安全信息的响应消息,以及用于维护所述应用的部分或全部安全信息的一个或多个定时器值给所述终端设备。The sending unit is specifically configured to send a response message including the security information of the application, and one or more timer values for maintaining part or all of the security information of the application to the terminal device.

根据本发明的实施例的另一方面,所述应用的所述安全信息包括以下信息的任意一项或组合:所述应用的报文签名信息、所述应用的接入控制列表信息、所述应用的畸形报文攻击信息、所述应用的有状态防火墙库信息以及所述应用的报文限速策略信息。According to another aspect of the embodiments of the present invention, the security information of the application includes any one or a combination of the following information: message signature information of the application, access control list information of the application, the Malformed packet attack information of the application, stateful firewall library information of the application, and packet rate limit policy information of the application.

根据本发明的实施例的另一方面,提供一种终端设备,包括:According to another aspect of the embodiments of the present invention, a terminal device is provided, including:

处理器和耦合至所述处理器的存储器;a processor and memory coupled to the processor;

其中所述处理器用于:where the processor is used to:

当应用在所述终端设备中被启动时,向NG防火墙服务器发送用于请求所述应用的安全信息的请求消息;When the application is started in the terminal device, sending a request message for requesting the security information of the application to the NG firewall server;

从所述NG防火墙服务器接收包含所述应用的所述安全信息的响应消息,其中所述应用的所述安全信息表示对所述终端设备中启动的所述应用作安全保护的信息;receiving a response message including the security information of the application from the NG firewall server, wherein the security information of the application represents information used as security protection for the application started in the terminal device;

通过使用所述应用的所述安全信息处理所述应用的数据。Data of the application is processed by using the security information of the application.

根据本发明的实施例的另一方面,提供了一种NG防火墙服务器,包括:According to another aspect of the embodiments of the present invention, an NG firewall server is provided, including:

处理器和耦合至所述处理器的存储器;a processor and memory coupled to the processor;

其中所述处理器用于:where the processor is used to:

从终端设备接收用于请求应用的安全信息的请求消息,其中所述应用的所述安全信息表示对所述终端设备中启动的所述应用作安全保护的信息;receiving a request message for requesting security information of an application from a terminal device, wherein the security information of the application represents information for security protection of the application started in the terminal device;

根据所述请求消息确定所述应用的所述安全信息;determining the security information of the application according to the request message;

向所述终端设备发送包含所述应用的所述安全信息的响应消息。Sending a response message including the security information of the application to the terminal device.

根据本发明的实施例的另一方面,提供了一种用于实施NG防火墙的系统,包括:According to another aspect of the embodiments of the present invention, a system for implementing an NG firewall is provided, including:

如上所述的一个或多个终端设备;以及one or more terminal devices as described above; and

如上所述的NG防火墙服务器。NG Firewall server as above.

本发明的实施例的有益效果在于:当应用在终端设备中被启动时,NG防火墙客户端向NG防火墙服务器请求所述应用的安全信息。因此,本发明的实施例可以实现动态加载攻击防范,从而终端设备所需的软件占用空间可以减少,并且安装在终端设备上的应用的性能可以得到提高。The beneficial effect of the embodiment of the present invention is that: when the application is started in the terminal device, the NG firewall client requests the security information of the application from the NG firewall server. Therefore, the embodiment of the present invention can realize dynamic loading attack defense, so that the software occupation space required by the terminal device can be reduced, and the performance of applications installed on the terminal device can be improved.

此外,终端设备将受到保护,免遭来自新应用或服务的新攻击。由于攻击防范的数量直接依赖于用户正在使用的应用的数量,所以信令报文将减少,这样有助于延长移动终端的电池寿命。In addition, end devices will be protected from new attacks from new applications or services. Since the amount of attack defense directly depends on the number of applications being used by the user, signaling packets will be reduced, which helps to extend the battery life of the mobile terminal.

参考以下描述和附图,本发明的这些和其他方面以及特征将显而易见。在描述和附图中,详细揭示了本发明的特定实施例,以指示出本发明的原理可以采用的一些方式,但应理解,本发明并不限于对应的范围。相反,本发明包括所附权利要求书的精神和项内的所有变化、修改以及等效物。These and other aspects and features of the present invention will become apparent with reference to the following description and drawings. In the description and drawings, specific embodiments of the invention have been disclosed in detail to indicate the manner in which the principles of the invention may be employed, but it is to be understood that the invention is not limited to the corresponding scope. Rather, the invention includes all changes, modifications and equivalents within the spirit and terms of the appended claims.

参考一项实施例描述和/或说明的特征可以采用相同方式或类似方式用于一项或多项其他实施例,和/或与其他实施例的特征结合使用或替代这些特征。Features described and/or illustrated with reference to one embodiment may be used in the same or similar manner in one or more other embodiments and/or in combination with or instead of features of other embodiments.

应强调的是,本说明书中所用的术语“包括”用于说明存在所述特征、整体、步骤或部件,但并不排除存在或添加一个或多个其他特征、整体、步骤、部件或上述项的组合。It should be emphasized that the term "comprising" used in this specification is used to describe the existence of the stated features, integers, steps or components, but does not exclude the existence or addition of one or more other features, integers, steps, components or the above-mentioned items. The combination.

参考以下附图可以更好地理解本发明的许多方面。附图中的部件不必按比例绘制,而是将重点放在清晰地说明本发明的原理上。为了有助于说明并描述本发明的一些部分,可以将附图中对应部分的尺寸放大,例如,相对于其他部分而言,使其比根据本发明实际制作的示例性装置大。本发明的一个附图或实施例中描绘的元件和特征可以与一个或多个额外附图或实施例中描绘的元件和特征相结合。此外,在附图中,相同参考编号指代若干视图中的对应部分,并且可以用来指代一项以上实施例中的相同或类似部分。Many aspects of the invention can be better understood with reference to the following figures. The components in the figures are not necessarily to scale, emphasis instead being placed upon clearly illustrating the principles of the invention. To help illustrate and describe some parts of the invention, the dimensions of corresponding parts of the drawings may be exaggerated, eg, relative to other parts, to be larger than an exemplary device actually made according to the invention. Elements and features depicted in one figure or embodiment of the invention may be combined with elements and features depicted in one or more additional figures or embodiments. Furthermore, in the drawings, the same reference numerals designate corresponding parts in the several views, and can be used to refer to the same or similar parts in more than one embodiment.

附图说明Description of drawings

附图被包括在内以提供对本发明的进一步理解,附图构成本说明书的一部分,说明本发明的优选实施例,并且与描述内容一起用于阐明本发明的原理。附图中相同的参考编号始终表示相同的元件。The accompanying drawings, which are included to provide a further understanding of the invention, constitute a part of this specification, illustrate preferred embodiments of the invention, and together with the description serve to explain the principle of the invention. Like reference numbers denote like elements throughout the drawings.

在附图中:In the attached picture:

图1为根据本发明的实施例的用于实施NG防火墙的方法的流程示意图;FIG. 1 is a schematic flow diagram of a method for implementing an NG firewall according to an embodiment of the present invention;

图2为图示关于终端设备和NG防火墙服务器的结构示意图;FIG. 2 is a schematic structural diagram illustrating a terminal device and an NG firewall server;

图3为根据本发明的实施例的用于实施NG防火墙的方法的流程示意图;FIG. 3 is a schematic flowchart of a method for implementing an NG firewall according to an embodiment of the present invention;

图4为根据本发明的实施例的用于实施NG防火墙的方法的另一流程示意图;FIG. 4 is another schematic flowchart of a method for implementing an NG firewall according to an embodiment of the present invention;

图5为根据本发明的实施例的步骤402的流程示意图;FIG. 5 is a schematic flowchart of step 402 according to an embodiment of the present invention;

图6为根据本发明的实施例的步骤403的流程示意图;FIG. 6 is a schematic flowchart of step 403 according to an embodiment of the present invention;

图7为根据本发明的实施例的步骤405的流程示意图;FIG. 7 is a schematic flowchart of step 405 according to an embodiment of the present invention;

图8为根据本发明的实施例的步骤406的流程示意图;FIG. 8 is a schematic flowchart of step 406 according to an embodiment of the present invention;

图9为根据本发明的实施例的步骤407的流程示意图;FIG. 9 is a schematic flowchart of step 407 according to an embodiment of the present invention;

图10为根据本发明的实施例的用于实施NG防火墙的方法的流程示意图;FIG. 10 is a schematic flowchart of a method for implementing an NG firewall according to an embodiment of the present invention;

图11为根据本发明的实施例的用于实施NG防火墙的方法的另一流程示意图;FIG. 11 is another schematic flowchart of a method for implementing an NG firewall according to an embodiment of the present invention;

图12为根据本发明的实施例的终端设备的结构示意图;FIG. 12 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;

图13为根据本发明的实施例的终端设备的结构示意图;FIG. 13 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;

图14为根据本发明的实施例的NG防火墙服务器的结构示意图;FIG. 14 is a schematic structural diagram of an NG firewall server according to an embodiment of the present invention;

图15为根据本发明的实施例的NG防火墙服务器的另一结构示意图;Fig. 15 is another schematic structural diagram of an NG firewall server according to an embodiment of the present invention;

图16为根据本发明的实施例的终端设备的结构示意图;FIG. 16 is a schematic structural diagram of a terminal device according to an embodiment of the present invention;

图17为根据本发明的实施例的NG防火墙服务器的结构示意图;FIG. 17 is a schematic structural diagram of an NG firewall server according to an embodiment of the present invention;

图18为根据本发明的实施例的用于实施NG防火墙的系统的结构示意图。Fig. 18 is a schematic structural diagram of a system for implementing an NG firewall according to an embodiment of the present invention.

具体实施方式Detailed ways

各实施例的许多特征和优点在详细说明书中显而易见,因此,所附权利要求书意图涵盖属于其真实精神和范围内的实施例的所有此类特征和优点。此外,由于所属领域的技术人员将容易想到多种修改和变化,因而并不希望将发明性实施例限于所说明并描述的确切构造和操作,因此,可以采取的所有适当修改和等效物均属于相应范围内。The many features and advantages of various embodiments are apparent in the detailed description, and thus, it is intended by the appended claims to cover all such features and advantages of embodiments which fall within their true spirit and scope. Furthermore, since numerous modifications and changes will readily occur to those skilled in the art, it is not desired to limit the inventive embodiments to the exact construction and operation illustrated and described, and therefore all suitable modifications and equivalents may be employed. fall within the corresponding range.

下文参考附图来描述本发明的实施例。Embodiments of the present invention are described below with reference to the drawings.

实施例1Example 1

本发明的该实施例提供一种用于实施NG防火墙的方法,该方法应用在NG防火墙客户端中。This embodiment of the present invention provides a method for implementing an NG firewall, which is applied in an NG firewall client.

图1是根据本发明的实施例1的用于实施NG防火墙的方法的流程示意图。如图1所示,所述方法包括:Fig. 1 is a schematic flowchart of a method for implementing an NG firewall according to Embodiment 1 of the present invention. As shown in Figure 1, the method includes:

步骤101,当应用在配置有NG防火墙客户端的终端设备中被启动时,NG防火墙客户端发送请求消息给NG防火墙服务器,其中,请求消息用于请求应用的安全信息。Step 101, when the application is started on the terminal device configured with the NG firewall client, the NG firewall client sends a request message to the NG firewall server, wherein the request message is used to request security information of the application.

步骤102,NG防火墙客户端从NG防火墙服务器接收响应消息;其中应用的安全消息包含在响应消息中;应用的安全信息表示在终端设备中启动的应用的安全保护的信息。In step 102, the NG firewall client receives a response message from the NG firewall server; the application security information is included in the response message; the application security information indicates security protection information of the application started in the terminal device.

步骤103,NG防火墙客户端通过使用应用的安全信息处理应用的数据。Step 103, the NG firewall client processes the data of the application by using the security information of the application.

在该实施例中,NG防火墙客户端可以配置在终端设备中,终端设备可以是固定设备或无线设备,例如,智能手机、平板电脑。应用可以是社交软件(例如,Skype、youtube),并且可能已经安装在终端设备中。然而,并不限于此,可根据实际需要来确定特定实施方式。In this embodiment, the NG firewall client may be configured in a terminal device, and the terminal device may be a fixed device or a wireless device, such as a smart phone or a tablet computer. The application may be social software (for example, Skype, youtube), and may already be installed in the terminal device. However, it is not limited thereto, and specific implementation manners can be determined according to actual needs.

在该实施例中,NG防火墙服务器具有一个含有NG防火墙的数据或信息的NG-FW数据库。关于NG-FW数据库的详情,请参考现有技术。NG防火墙服务器可以通过终端设备(例如智能手机)的任意接口,例如,蓝牙、USP端口或任何空中接口进行连接。In this embodiment, the NG firewall server has an NG-FW database containing data or information of the NG firewall. For details about the NG-FW database, please refer to the prior art. The NG firewall server can be connected through any interface of a terminal device (such as a smart phone), such as Bluetooth, a USP port or any air interface.

在该实施例中,应用的安全信息可包括:应用的报文签名信息、应用的接入控制列表信息、应用的畸形攻击信息、应用的状态防火墙库信息以及应用的报文限速策略信息。然而,并不限于此,可根据实际需要来确定特定实施方式。In this embodiment, the security information of the application may include: message signature information of the application, access control list information of the application, malformed attack information of the application, stateful firewall database information of the application, and message rate limit policy information of the application. However, it is not limited thereto, and specific implementation manners can be determined according to actual needs.

图2为图示关于终端设备和NG防火墙服务器的结构的示例的示意图。应注意的是该图仅是示例性的,其他类型的结构可用于补充或替换此结构。FIG. 2 is a schematic diagram illustrating an example of a configuration regarding a terminal device and an NG firewall server. It should be noted that this figure is only exemplary and other types of structures may be used to supplement or replace this structure.

如图2所示,配置有NG-FW客户端的终端设备中存在一些应用;同时配置有数据库的NG-FW服务器中存在这些应用的安全信息(例如应用的攻击防范数据)。As shown in Figure 2, there are some applications in the terminal device configured with the NG-FW client; meanwhile, the security information of these applications (such as attack defense data of the application) exists in the NG-FW server configured with the database.

例如,存储应用的安全信息的数据库可以配置在NG-FW服务器中;换句话说,数据库是NG-FW服务器的本地数据库。在另一示例中,存储应用的安全信息的数据库可以单独配置;NG-GW服务器可以通过通信接口访问该数据库。然而,并不限于此。For example, the database storing application security information can be configured in the NG-FW server; in other words, the database is a local database of the NG-FW server. In another example, the database storing application security information can be configured separately; the NG-GW server can access the database through the communication interface. However, it is not limited to this.

在该实施例中,NG-FW是终端设备(智能手机等)的强制要求之一以实现BYOD,获得个人理财和战略业务信息以及安全个人信息。智能手机是电池操作设备,还具有有限的计算资源。In this embodiment, NG-FW is one of the mandatory requirements for terminal devices (smartphones, etc.) to enable BYOD, obtain personal financial and strategic business information, and secure personal information. Smartphones are battery operated devices and also have limited computing resources.

随着移动VAS(增值业务)的数量呈指数级增长,攻击的数量也将呈指数级增长,因此NG-FW的软件占用空间以及使用复杂应用框架处理每种类型的攻击将会很昂贵。显然,移动用户同时将使用数量非常有限的应用。As the number of mobile VAS (value-added services) grows exponentially, so will the number of attacks, so the software footprint of NG-FW and the use of complex application frameworks to handle each type of attack will be expensive. Obviously, a mobile user will use a very limited number of applications at the same time.

在该实施例中,例如,基于NG-FW的穷尽攻击防范可以安装在集中式实体上,例如,在环境中的分组核心网、辅助存储器,或服务器中。当智能手机用户启动任何应用时,攻击防范请求将被发送到NG-FW数据库。智能手机将安装应用特定攻击防范、接入控制列表以及应用签名。任何Rx/Tx报文将检查新安装的攻击防范,这样入口和出口应用的接入控制就可以在智能手机上实现。In this embodiment, for example, NG-FW based exhaustive attack defense can be installed on a centralized entity, eg, in a packet core network, secondary storage, or server in the environment. When a smartphone user launches any application, the attack defense request will be sent to the NG-FW database. Smartphones will have application-specific attack defenses, access control lists, and application signatures installed. Any Rx/Tx packets will check the newly installed attack defense, so that the access control of ingress and egress applications can be implemented on the smartphone.

从上述实施例可以看出:当应用在配置有NG防火墙客户端的终端设备中被启动时,NG防火墙客户端向NG防火墙服务器请求应用的安全信息。因此,本发明的实施例可以实现动态加载攻击防范,从而终端设备所需的软件占用空间可以减少,并且安装在终端设备上的应用的性能可以得到提高。It can be seen from the above embodiments that when the application is started in the terminal device configured with the NG firewall client, the NG firewall client requests the security information of the application from the NG firewall server. Therefore, the embodiment of the present invention can realize dynamic loading attack defense, so that the software occupation space required by the terminal device can be reduced, and the performance of applications installed on the terminal device can be improved.

实施例2Example 2

基于实施例1,本发明的该实施例提供一种用于实施NG防火墙的方法;相同内容将不再予以描述。Based on Embodiment 1, this embodiment of the present invention provides a method for implementing an NG firewall; the same content will not be described again.

图3为根据本发明的实施例的用于实施NG防火墙的方法的流程示意图。如图3所示,该方法包括:Fig. 3 is a schematic flowchart of a method for implementing an NG firewall according to an embodiment of the present invention. As shown in Figure 3, the method includes:

步骤301,当应用在配置有NG防火墙客户端的终端设备中被启动时,NG防火墙客户端发送请求消息给NG防火墙服务器,其中该请求消息用于请求所述应用的安全信息。Step 301, when the application is started on the terminal device configured with the NG firewall client, the NG firewall client sends a request message to the NG firewall server, wherein the request message is used to request security information of the application.

在该实施例中,请求消息可包括应用的识别信息,例如,应用的标识符或应用的种类;应用的识别信息由NG防火墙服务器用来确定应用的安全信息。然而,并不限于此,可根据实际需要来确定特定实施方式。In this embodiment, the request message may include application identification information, for example, application identifier or application type; the application identification information is used by the NG firewall server to determine application security information. However, it is not limited thereto, and specific implementation manners can be determined according to actual needs.

步骤302,NG防火墙从NG防火墙服务器接收包含应用的安全信息的响应消息。In step 302, the NG firewall receives a response message containing application security information from the NG firewall server.

步骤303,NG防火墙客户端通过使用应用的安全信息处理应用的数据。In step 303, the NG firewall client processes the data of the application by using the security information of the application.

如图3所示,该方法可进一步包括:As shown in Figure 3, the method may further include:

步骤304,当应用在终端设备中关闭时,NG防火墙客户端清除应用的安全信息。Step 304, when the application is closed in the terminal device, the NG firewall client clears the security information of the application.

在该实施例中,一旦智能手机结束或关闭应用(例如Skype),应用的安全信息(例如,所有安装和下载的数据、应用接入列表和签名)被清空。In this embodiment, once the smartphone terminates or closes the application (such as Skype), the application's security information (eg, all installed and downloaded data, application access list and signature) is cleared.

图4是根据本发明的实施例的用于实施NG防火墙的方法的另一流程示意图。终端设备配置有NG-FW客户端。如图4所示,该方法可包括:Fig. 4 is another schematic flowchart of a method for implementing an NG firewall according to an embodiment of the present invention. The terminal device is configured with the NG-FW client. As shown in Figure 4, the method may include:

步骤401,在终端设备中启用NG防火墙功能。Step 401, enable the NG firewall function in the terminal device.

步骤402,在终端设备中配置NG防火墙服务器的IP地址和端口号。Step 402, configure the IP address and port number of the NG firewall server in the terminal device.

在该步骤中,终端设备可基于NG防火墙服务器的IP地址和端口号生成请求消息。In this step, the terminal device may generate a request message based on the IP address and port number of the NG firewall server.

步骤403,当应用在终端设备中被启动时,终端设备发送请求消息给NG防火墙服务器;其中请求消息用于请求应用的安全信息并包括应用的识别信息。Step 403, when the application is started in the terminal device, the terminal device sends a request message to the NG firewall server; wherein the request message is used to request security information of the application and includes identification information of the application.

步骤404,NG防火墙服务器在接收请求消息之后根据请求消息中包含的应用的识别信息确定应用的安全信息。Step 404, after receiving the request message, the NG firewall server determines the security information of the application according to the identification information of the application included in the request message.

在该实施例中,NG-FW服务器可发送响应消息给终端设备;应用的安全信息包含在响应消息中。In this embodiment, the NG-FW server can send a response message to the terminal device; the security information of the application is included in the response message.

此外,用于保存应用的部分或全部安全信息的一个或多个定时器值可包含在响应消息中。Additionally, one or more timer values for saving some or all of the application's security information may be included in the response message.

例如,响应消息中存在一个定时器值,用于应用的所有安全信息;或存在一个定时器值,用于应用的报文签名信息;另一定时器值,用于应用的接入控制列表信息;以及另一定时器值,用于应用的畸形攻击信息。然而,并不限于此,可根据实际需要来确定特定实施方式。For example, there is a timer value in the response message, which is used for all security information of the application; or there is a timer value, which is used for the message signature information of the application; another timer value is used for the access control list information of the application ; and another timer value, which is used for the malformed attack information of the application. However, it is not limited thereto, and specific implementation manners can be determined according to actual needs.

步骤405,NG防火墙从NG防火墙服务器接收包含应用的安全信息的响应消息。Step 405, the NG firewall receives a response message containing the security information of the application from the NG firewall server.

步骤406,NG防火墙客户端通过使用应用的安全信息处理应用的数据。In step 406, the NG firewall client processes the data of the application by using the security information of the application.

在该实施例中,当对应于应用的部分安全信息的一个或多个定时器值中的一个或多个定时器超时时,终端设备可重新请求应用的部分安全信息。In this embodiment, when one or more timers among the one or more timer values corresponding to the partial security information of the application expire, the terminal device may re-request the partial security information of the application.

或者,当对应于应用的全部安全信息的一个或多个定时器值中的一个或多个定时器超时时,终端设备可重新请求应用的全部安全信息。Alternatively, when one or more timers among the one or more timer values corresponding to the entire security information of the application expire, the terminal device may re-request the entire security information of the application.

例如,如果响应消息中存在用于应用的全部安全信息的定时器值A,则当对应于定时器值A的定时器超时时,终端设备可重新请求应用的全部安全信息。For example, if there is a timer value A for all security information of the application in the response message, when the timer corresponding to the timer value A expires, the terminal device may re-request all security information of the application.

又例如,如果响应消息中有三个定时器值:用于应用的报文签名信息的定时器值B、用于应用的接入控制列表信息的定时器值C以及用于应用的畸形攻击信息的定时器值D,则当对应于定时器值B的定时器超时时,终端设备可重新请求应用的报文签名信息;或当对应于定时器值C的定时器超时时,终端设备可重新请求应用的接入控制列表信息;或当对应于定时器值D的定时器超时时,终端设备可重新请求应用的畸形攻击信息。For another example, if there are three timer values in the response message: timer value B for the message signature information of the application, timer value C for the access control list information of the application, and timer value C for the malformed attack information of the application timer value D, then when the timer corresponding to timer value B expires, the terminal device can re-request the message signature information of the application; or when the timer corresponding to timer value C expires, the terminal device can re-request The access control list information of the application; or when the timer corresponding to the timer value D expires, the terminal device may re-request the malformed attack information of the application.

如图4所示,该方法可进一步包括:As shown in Figure 4, the method may further include:

步骤407,当应用在终端设备中关闭时,终端设备清除应用的安全信息。Step 407, when the application is closed in the terminal device, the terminal device clears the security information of the application.

在该步骤中,终端设备还可基于定时器清除应用的安全信息。终端设备将在定时器超时时清除应用的安全信息。In this step, the terminal device may also clear the security information of the application based on the timer. The terminal device will clear the security information of the application when the timer expires.

例如,当对应于应用的部分安全信息的一个或多个定时器值中的一个或多个定时器超时时,终端设备可清除应用的部分安全信息。或者,当对应于应用的全部安全信息的一个或多个定时器值中的一个或多个定时器超时时,终端设备可清除应用的全部安全信息。For example, when one or more timers among the one or more timer values corresponding to the partial security information of the application expire, the terminal device may clear the partial security information of the application. Alternatively, when one or more timers among the one or more timer values corresponding to all security information of the application expire, the terminal device may clear all security information of the application.

在步骤401中,在终端设备上启用NG-FW客户端(其具有NG防火强功能)。可以允许每个应用来选择终端设备用户是否想要启用NG-FW攻击应用。默认所有的应用都不允许从NG-FW服务器上下载。In step 401, the NG-FW client (which has the function of NG fire protection) is enabled on the terminal device. Each application may be allowed to choose whether the end device user wants to enable the NG-FW attack application. By default, all applications are not allowed to be downloaded from the NG-FW server.

在步骤402中,NG防火墙服务器信息,例如NG防火墙服务器的端口号和IP地址,可由用户在终端设备中配置。此外,用于保存应用的安全信息的定时器值可由用户在终端设备中配置。In step 402, the information of the NG firewall server, such as the port number and IP address of the NG firewall server, can be configured by the user in the terminal device. In addition, the timer value for saving the security information of the application can be configured by the user in the terminal device.

在该实施例中,应用的安全信息可包括以下信息的任意一项或组合:应用的报文签名信息、应用的接入控制列表信息、应用的畸形攻击信息、应用的状态防火墙库信息以及应用的报文限速策略信息。In this embodiment, the security information of the application may include any one or a combination of the following information: message signature information of the application, access control list information of the application, malformed attack information of the application, stateful firewall library information of the application, and application Packet rate limit policy information.

其中存在不同的定时器值用于保存以下信息的任意一项或组合:应用的报文签名信息、应用的接入控制列表信息、应用的畸形攻击信息、应用的状态防火墙库信息以及应用的报文限速策略信息。There are different timer values for storing any one or combination of the following information: application message signature information, application access control list information, application malformed attack information, application stateful firewall library information, and application message signature information. Text speed limit policy information.

或者,存在相同的定时器值用于保存以下信息的任意一项或组合:应用的报文签名信息、应用的接入控制列表信息、应用的畸形攻击信息、应用的状态防火墙库信息以及应用的报文限速策略信息。Alternatively, the same timer value is used to store any one or combination of the following information: message signature information of the application, access control list information of the application, malformed attack information of the application, stateful firewall library information of the application, and Packet rate limit policy information.

在该实施例中,通过使用应用的安全信息处理应用的数据的过程可包括:通过使用应用的报文签名信息处理应用的数据,或通过使用应用的接入控制列表信息处理应用的数据,或通过使用应用的畸形攻击信息处理应用的数据,或通过使用应用的状态防火墙库信息处理应用的数据,或通过使用应用的报文限速策略信息处理应用的数据。In this embodiment, the process of processing the data of the application by using the security information of the application may include: processing the data of the application by using the message signature information of the application, or processing the data of the application by using the access control list information of the application, or Process application data by using application malformed attack information, process application data by using application stateful firewall library information, or process application data by using application packet rate limit policy information.

图5为根据本发明的实施例的步骤402的流程示意图。如图5所示,终端设备判断现有策略中是否存在任何变化;例如,判断安全配置是否是默认配置(步骤501)。FIG. 5 is a schematic flowchart of step 402 according to an embodiment of the present invention. As shown in FIG. 5 , the terminal device judges whether there is any change in the existing policy; for example, judges whether the security configuration is the default configuration (step 501 ).

当配置不是默认配置时,在终端设备中配置端口号和IP地址(步骤502)。此外,可以配置用于保存应用的安全信息的定时器。When the configuration is not the default configuration, configure the port number and IP address in the terminal device (step 502). In addition, a timer for saving the security information of the application can be configured.

在步骤403中,例如,终端设备的用户启动“Skype”等应用进行社交活动。事件将被发送给在终端设备上运行的NG-FW客户端。终端设备将生成请求消息以请求应用的安全信息。该请求消息可以基于任何传送机制。In step 403, for example, the user of the terminal device starts an application such as "Skype" to perform social activities. Events will be sent to the NG-FW client running on the terminal device. The end device will generate a request message to request security information for the application. The request message can be based on any transport mechanism.

在实施中,应用的安全信息可包括:应用的报文签名信息、应用的接入控制列表信息、应用的畸形攻击、应用的状态防火墙库信息以及应用的报文限速策略信息等。In the implementation, the security information of the application may include: the message signature information of the application, the access control list information of the application, the malformed attack of the application, the stateful firewall database information of the application, and the message rate limit policy information of the application, etc.

图6为根据本发明的实施例的步骤403的流程示意图。如图6所示,终端设备可判断安全信息是否是默认配置(步骤601)。当配置不是默认配置时,终端设备可触发事件(步骤602),例如发送消息给在终端设备中配置的NG-FW客户端。FIG. 6 is a schematic flowchart of step 403 according to an embodiment of the present invention. As shown in FIG. 6, the terminal device may determine whether the security information is a default configuration (step 601). When the configuration is not the default configuration, the terminal device may trigger an event (step 602), such as sending a message to the NG-FW client configured in the terminal device.

随后,终端设备可判断NG-FW数据库是否退出应用(步骤603)。当NG-FW数据库未退出应用时,终端设备发送请求应用的安全信息的请求消息(步骤604)。Subsequently, the terminal device can determine whether the NG-FW database exits the application (step 603). When the NG-FW database has not exited the application, the terminal device sends a request message requesting the security information of the application (step 604).

如图6所示,终端设备可判断是否发生超时或是否接收到确认消息(步骤605);如果否,终端设备将继续下载应用的安全信息和更新现有策略(步骤606)。随后,使用现有应用策略和安全机制(即,攻击防范机制)(步骤607)。As shown in Figure 6, the terminal device can determine whether a timeout occurs or whether a confirmation message is received (step 605); if not, the terminal device will continue to download the security information of the application and update the existing policy (step 606). Then, use existing application policies and security mechanisms (ie, attack prevention mechanisms) (step 607).

在步骤403中,请求消息可基于作为传送协议的UDP(用户数据报协议)生成。请求消息的格式如下所示。In step 403, the request message may be generated based on UDP (User Datagram Protocol) as the transfer protocol. The format of the request message is as follows.

在步骤405中,NG防火墙服务器发送应用的安全信息,例如,所有攻击防范策略、NG-FW应用和签名。In step 405, the NG firewall server sends application security information, for example, all attack prevention policies, NG-FW applications and signatures.

图7为根据本发明的实施例的步骤405的流程示意图。如图7所示,NG防火墙服务器从终端设备接收请求消息(步骤701)。随后,NG防火墙服务器可判断是否对终端设备进行认证(步骤702)。FIG. 7 is a schematic flowchart of step 405 according to an embodiment of the present invention. As shown in FIG. 7, the NG firewall server receives a request message from a terminal device (step 701). Subsequently, the NG firewall server may determine whether to authenticate the terminal device (step 702).

如图7所示,当终端设备认证为有效用户时,NG防火墙服务器将确定应用的安全信息(步骤703),例如最新的攻击防范策略和库。随后,NG防火墙服务器可判断NG-FW数据库是否退出应用(步骤704)。当NG-FW数据库未退出应用时,NG防火墙服务器将发送应用的安全信息(例如,应用特定攻击防范和更新的现有策略)给终端设备(步骤705)。随后,NG防火墙服务器可发送确认消息(步骤706)。As shown in Fig. 7, when the terminal device is authenticated as a valid user, the NG firewall server will determine the security information of the application (step 703), such as the latest attack prevention strategy and library. Subsequently, the NG firewall server can determine whether the NG-FW database exits the application (step 704). When the NG-FW database has not exited the application, the NG firewall server will send the application's security information (for example, application-specific attack defense and updated existing policies) to the terminal device (step 705). Subsequently, the NG firewall server may send an acknowledgment message (step 706).

在步骤405中,包含应用的安全信息的响应消息可基于作为传送协议的UDP生成。响应消息的格式如下所示。In step 405, a response message containing the security information of the application may be generated based on UDP as the transfer protocol. The format of the response message is as follows.

在步骤406中,终端设备下载NG-FW应用并在数据平面中安装应用接入列表和签名。来自/到达终端设备的应用的任意接收/发送的报文将由应用的安全信息处理。In step 406, the terminal device downloads the NG-FW application and installs the application access list and signature in the data plane. Any received/sent messages from/to the application of the end device will be handled by the application's security information.

图8为根据本发明的实施例的步骤406的流程示意图。如图8所示,终端设备从NG-FW服务器接收应用的安全信息(步骤801),例如应用特定攻击防范。随后,终端设备判断是否对NG防火墙服务器进行认证(步骤802)。当NG防火墙服务器被认证时,终端设备下载应用的所有安全信息,例如所有攻击防范机制。FIG. 8 is a schematic flowchart of step 406 according to an embodiment of the present invention. As shown in FIG. 8 , the terminal device receives application security information from the NG-FW server (step 801 ), such as application-specific attack defense. Subsequently, the terminal device judges whether to authenticate the NG firewall server (step 802). When the NG firewall server is authenticated, the terminal device downloads all security information of the application, such as all attack prevention mechanisms.

在步骤407中,一旦终端设备的用户结束或关闭应用(例如Skype),应用的安全信息(包括所有安装和下载的应用接入列表和签名)将被清空。In step 407, once the user of the terminal device terminates or closes the application (such as Skype), the security information of the application (including all installed and downloaded application access lists and signatures) will be cleared.

图9为根据本发明的实施例的步骤407的流程示意图。如图9所示,终端设备可进一步判断其是否超时(步骤901);当其超时时,终端设备发送消息以清除下载的数据(步骤902)。FIG. 9 is a schematic flowchart of step 407 according to an embodiment of the present invention. As shown in FIG. 9, the terminal device may further determine whether it times out (step 901); when it times out, the terminal device sends a message to clear the downloaded data (step 902).

从上述实施例可以看出:当应用在配置有NG防火墙客户端的终端设备中被启动时,NG防火墙客户端向NG防火墙服务器请求应用的安全信息。因此,本发明的实施例可以实现动态加载攻击防范,从而终端设备所需的软件占用空间可以减少,并且安装在终端设备上的应用的性能可以得到提高。It can be seen from the above embodiments that when the application is started in the terminal device configured with the NG firewall client, the NG firewall client requests the security information of the application from the NG firewall server. Therefore, the embodiment of the present invention can realize dynamic loading attack defense, so that the software occupation space required by the terminal device can be reduced, and the performance of applications installed on the terminal device can be improved.

此外,终端设备将受到保护,免遭来自新应用或服务的新攻击。由于攻击防范的数量直接依赖于用户正在使用的应用的数量,所以信令报文将减少,这样有助于延长移动终端的电池寿命。In addition, end devices will be protected from new attacks from new applications or services. Since the amount of attack defense directly depends on the number of applications being used by the user, signaling packets will be reduced, which helps to extend the battery life of the mobile terminal.

实施例3Example 3

本发明的该实施例提供一种用于实施NG防火墙的方法,该方法应用在NG防火墙服务器中。该实施例对应于上述实施例1或2,并且相同内容将不再予以描述。This embodiment of the present invention provides a method for implementing an NG firewall, which is applied in an NG firewall server. This embodiment corresponds to Embodiment 1 or 2 described above, and the same content will not be described again.

图10是根据本发明的实施例的用于实施NG防火墙的方法的流程示意图。如图10所示,该方法包括:Fig. 10 is a schematic flowchart of a method for implementing an NG firewall according to an embodiment of the present invention. As shown in Figure 10, the method includes:

步骤1001,NG防火墙服务器从终端设备接收请求消息,其中请求消息用于请求应用的安全信息;应用的安全信息表示在终端设备中启动的应用的安全保护的信息。In step 1001, the NG firewall server receives a request message from a terminal device, wherein the request message is used to request application security information; the application security information indicates security protection information of an application started in the terminal device.

步骤1002,NG防火墙服务器根据请求消息确定应用的安全信息。Step 1002, the NG firewall server determines the security information of the application according to the request message.

步骤1003,NG防火墙服务器发送包含应用的安全信息的响应消息给终端设备。In step 1003, the NG firewall server sends a response message including application security information to the terminal device.

在该实施例中,应用的安全信息包括:应用的报文签名信息、应用的接入控制列表信息、应用的畸形攻击信息、应用的状态防火墙库信息以及应用的报文限速策略信息。然而,并不限于此,可根据实际需要来确定特定实施方式。In this embodiment, the security information of the application includes: message signature information of the application, access control list information of the application, malformed attack information of the application, stateful firewall database information of the application, and message rate limit policy information of the application. However, it is not limited thereto, and specific implementation manners can be determined according to actual needs.

图11是根据本发明的实施例的用于实施NG防火墙的方法的另一流程示意图。如图11所示,所述方法包括:Fig. 11 is another schematic flowchart of a method for implementing an NG firewall according to an embodiment of the present invention. As shown in Figure 11, the method includes:

步骤1101,NG防火墙服务器从终端设备接收请求消息,其中请求消息用于请求应用的安全信息;应用的安全信息表示在终端设备中启动的应用的安全保护的信息。In step 1101, the NG firewall server receives a request message from the terminal device, wherein the request message is used to request application security information; the application security information indicates security protection information of the application started in the terminal device.

步骤1103,NG防火墙服务器根据请求消息确定应用的安全信息。Step 1103, the NG firewall server determines the security information of the application according to the request message.

在该实施例中,根据请求消息确定应用的安全信息的过程可包括:根据请求消息中包含的应用的识别信息从数据库中获取应用的安全信息。In this embodiment, the process of determining the security information of the application according to the request message may include: obtaining the security information of the application from the database according to the identification information of the application included in the request message.

例如,存储应用的安全信息的数据库可以配置在NG-FW服务器中;换句话说,数据库是NG-FW服务器的本地数据库。在另一示例中,存储应用的安全信息的数据库可以单独配置;NG-GW服务器可以通过通信接口访问该数据库。然而,并不限于此。For example, the database storing application security information can be configured in the NG-FW server; in other words, the database is a local database of the NG-FW server. In another example, the database storing application security information can be configured separately; the NG-GW server can access the database through the communication interface. However, it is not limited to this.

步骤1104,NG防火墙服务器发送包含应用的安全信息的响应消息给终端设备。Step 1104, the NG firewall server sends a response message including the security information of the application to the terminal device.

如图11所示,该方法可进一步包括:As shown in Figure 11, the method may further include:

步骤1102,NG防火墙服务器认证请求消息是否有效。当请求消息有效时,执行发送包含应用的安全信息的响应消息给终端设备的过程。Step 1102, whether the NG firewall server authentication request message is valid. When the request message is valid, a process of sending a response message containing the security information of the application to the terminal device is performed.

在该实施例中,用于保存应用的部分或全部安全信息的一个或多个定时器值可包含在响应消息中。In this embodiment, one or more timer values for saving some or all of the application's security information may be included in the response message.

该方法可进一步包括:确定用于保存应用的部分或全部安全信息的一个或多个定时器值;发送包含应用的安全信息的响应消息给终端设备(步骤1104)可包括:发送包含应用的安全信息的响应消息,以及用于保存应用的部分或全部安全信息的一个或多个定时器值给终端设备。The method may further include: determining one or more timer values for storing part or all of the security information of the application; sending a response message containing the security information of the application to the terminal device (step 1104) may include: sending a response message containing the security information of the application The response message of the information, and one or more timer values used to save part or all of the security information of the application are given to the terminal device.

应注意,在上述网络环境中,由NG-FW服务器发回的应用的安全信息对于终端设备的不同应用可能有所不同。或者,NG-FW服务器可发回不同的安全信息用于终端设备的不同请求消息。然而,并不限于此,可根据实际需要来确定特定实施方式。It should be noted that in the above network environment, the security information of the application sent back by the NG-FW server may be different for different applications of the terminal device. Alternatively, the NG-FW server may send back different security information for different request messages of the terminal device. However, it is not limited thereto, and specific implementation manners can be determined according to actual needs.

从上述实施例可以看出:当应用在配置有NG防火墙客户端的终端设备中被启动时,NG防火墙客户端向NG防火墙服务器请求应用的安全信息。因此,本发明的实施例可以实现动态加载攻击防范,从而终端设备所需的软件占用空间可以减少,并且安装在终端设备上的应用的性能可以得到提高。It can be seen from the above embodiments that when the application is started in the terminal device configured with the NG firewall client, the NG firewall client requests the security information of the application from the NG firewall server. Therefore, the embodiment of the present invention can realize dynamic loading attack defense, so that the software occupation space required by the terminal device can be reduced, and the performance of applications installed on the terminal device can be improved.

实施例4Example 4

本发明的该实施例进一步提供在终端设备中配置的NG防火墙客户端。该实施例对应于上述实施例1的方法,并且相同内容将不再予以描述。This embodiment of the present invention further provides an NG firewall client configured in a terminal device. This embodiment corresponds to the method of Embodiment 1 above, and the same content will not be described again.

图12为根据本发明的实施例的NG防火墙客户端的结构示意图。如图12所示,NG防火墙客户端1200包括:发送单元1201、接收单元1202以及处理单元1203。NG防火墙客户端的其他部件可以参考现有技术并且在本发明中不再予以描述。然而,并不限于此,可根据实际需要来确定特定实施方式。Fig. 12 is a schematic structural diagram of an NG firewall client according to an embodiment of the present invention. As shown in FIG. 12 , the NG firewall client 1200 includes: a sending unit 1201 , a receiving unit 1202 and a processing unit 1203 . Other components of the NG firewall client can refer to the prior art and will not be described in the present invention. However, it is not limited thereto, and specific implementation manners can be determined according to actual needs.

其中发送单元1201用于,当应用在配置有NG防火墙客户端的终端设备中被启动时,发送请求消息以请求应用的安全信息;接收单元1202用于接收包含应用的安全信息的响应消息;处理单元1203用于通过使用应用的安全信息处理应用的数据。The sending unit 1201 is used to send a request message to request the security information of the application when the application is started in the terminal device configured with the NG firewall client; the receiving unit 1202 is used to receive the response message containing the security information of the application; the processing unit 1203 is used to process data of the application by using the security information of the application.

在该实施例中,发送单元1201可具体用于,当应用在配置有NG防火墙客户端的终端设备中被启动时,发送用于请求应用的安全信息的请求消息给NG防火墙服务器;其中请求消息包含应用的识别信息,以及应用的识别信息由NG防火墙服务器用来确定应用的安全信息。In this embodiment, the sending unit 1201 can be specifically configured to, when the application is started in the terminal device configured with the NG firewall client, send a request message for requesting the security information of the application to the NG firewall server; wherein the request message includes The identification information of the application, and the identification information of the application are used by the NG firewall server to determine the security information of the application.

从上述实施例可以看出:当应用在配置有NG防火墙客户端的终端设备中被启动时,NG防火墙客户端向NG防火墙服务器请求应用的安全信息。因此,本发明的实施例可以实现动态加载攻击防范,从而终端设备所需的软件占用空间可以减少,并且安装在终端设备上的应用的性能可以得到提高。It can be seen from the above embodiments that when the application is started in the terminal device configured with the NG firewall client, the NG firewall client requests the security information of the application from the NG firewall server. Therefore, the embodiment of the present invention can realize dynamic loading attack defense, so that the software occupation space required by the terminal device can be reduced, and the performance of applications installed on the terminal device can be improved.

实施例5Example 5

本发明的该实施例进一步提供在终端设备中配置的NG防火墙客户端。该实施例对应于上述实施例2的方法,并且相同内容将不再予以描述。This embodiment of the present invention further provides an NG firewall client configured in a terminal device. This embodiment corresponds to the method of Embodiment 2 above, and the same content will not be described again.

图13为根据本发明的实施例的NG防火墙客户端的结构示意图。如图13所示,NG防火墙客户端1300包括:发送单元1201、接收单元1202以及处理单元1203,如上述实施例4所述。Fig. 13 is a schematic structural diagram of an NG firewall client according to an embodiment of the present invention. As shown in FIG. 13 , the NG firewall client 1300 includes: a sending unit 1201 , a receiving unit 1202 and a processing unit 1203 , as described in Embodiment 4 above.

如图13所示,NG防火墙客户端1300可进一步包括:清除单元1304。清除单元1304用于,当应用在终端设备中关闭时,清除应用的安全信息。As shown in FIG. 13 , the NG firewall client 1300 may further include: a clearing unit 1304 . The clearing unit 1304 is configured to clear the security information of the application when the application is closed in the terminal device.

如图13所示,NG防火墙客户端1300可进一步包括:开启单元1305、配置单元1306以及生成单元1307。其中,开启单元1305用于启用NG防火墙功能;配置单元1306用于配置NG防火墙服务器的IP地址和端口号;生成单元1307用于生成请求消息。As shown in FIG. 13 , the NG firewall client 1300 may further include: an opening unit 1305 , a configuring unit 1306 and a generating unit 1307 . Wherein, the enabling unit 1305 is used for enabling the NG firewall function; the configuring unit 1306 is used for configuring the IP address and port number of the NG firewall server; the generating unit 1307 is used for generating a request message.

在该实施例中,响应消息可进一步包括用于保存应用的部分或全部安全信息的一个或多个定时器值;以及发送单元进一步用于,当对应于应用的部分安全信息的一个或多个定时器值中的一个或多个定时器超时时,重新请求应用的部分安全信息,或当对应于应用的全部安全信息的一个或多个定时器值中的一个或多个定时器超时时,重新请求应用的全部安全信息。In this embodiment, the response message may further include one or more timer values for storing part or all of the security information of the application; and the sending unit is further configured to, when one or more When one or more of the timer values expires, re-request part of the application's security information, or when one or more of the one or more timer values corresponding to the entire application's security information expires, Re-request all security information for the app.

在该实施例中,清除单元可进一步用于,当对应于应用的部分安全信息的一个或多个定时器值中的一个或多个定时器超时时,清除应用的部分安全信息,或当对应于应用的全部安全信息的一个或多个定时器值中的一个或多个定时器超时时,清除应用的全部安全信息。In this embodiment, the clearing unit may be further configured to, when one or more timers among the one or more timer values corresponding to the partial security information of the application expires, clear the partial security information of the application, or when the corresponding When one or more timers in the one or more timer values of all security information of the application expire, all security information of the application is cleared.

在该实施例中,应用的安全信息可包括以下信息的任意一项或组合:应用的报文签名信息、应用的接入控制列表信息、应用的畸形攻击信息、应用的状态防火墙库信息以及应用的报文限速策略信息。In this embodiment, the security information of the application may include any one or a combination of the following information: message signature information of the application, access control list information of the application, malformed attack information of the application, stateful firewall library information of the application, and application Packet rate limit policy information.

其中处理单元1203可具体用于:通过使用应用的报文签名信息处理应用的数据,或通过使用应用的接入控制列表信息处理应用的数据,或通过使用应用的畸形攻击信息处理应用的数据,或通过使用应用的状态防火墙库信息处理应用的数据,或通过使用应用的报文限速策略信息处理应用的数据。The processing unit 1203 may be specifically configured to: process data of the application by using message signature information of the application, process data of the application by using access control list information of the application, or process data of the application by using malformed attack information of the application, Or process the data of the application by using the stateful firewall library information of the application, or process the data of the application by using the packet rate limit policy information of the application.

从上述实施例可以看出:当应用在配置有NG防火墙客户端的终端设备中被启动时,NG防火墙客户端向NG防火墙服务器请求应用的安全信息。因此,本发明的实施例可以实现动态加载攻击防范,从而终端设备所需的软件占用空间可以减少,并且安装在终端设备上的应用的性能可以得到提高。It can be seen from the above embodiments that when the application is started in the terminal device configured with the NG firewall client, the NG firewall client requests the security information of the application from the NG firewall server. Therefore, the embodiment of the present invention can realize dynamic loading attack defense, so that the software occupation space required by the terminal device can be reduced, and the performance of applications installed on the terminal device can be improved.

此外,终端设备将受到保护,免遭来自新应用或服务的新攻击。由于攻击防范的数量直接依赖于用户正在使用的应用的数量,所以信令报文将减少,这样有助于延长移动终端的电池寿命。In addition, end devices will be protected from new attacks from new applications or services. Since the amount of attack defense directly depends on the number of applications being used by the user, signaling packets will be reduced, which helps to extend the battery life of the mobile terminal.

实施例6Example 6

本发明的该实施例进一步提供NG防火墙服务器。该实施例对应于上述实施例3的方法,并且相同内容将不再予以描述。This embodiment of the invention further provides an NG firewall server. This embodiment corresponds to the method of Embodiment 3 above, and the same content will not be described again.

图14为根据本发明的实施例的NG防火墙服务器的结构示意图。如图14所示,终端设备1400包括:接收单元1401、第一确定单元1402以及发送单元1403。NG防火墙客户端的其他部件可以参考现有技术并且在本发明中不再予以描述。然而,并不限于此,可根据实际需要来确定特定实施方式。Fig. 14 is a schematic structural diagram of an NG firewall server according to an embodiment of the present invention. As shown in FIG. 14 , a terminal device 1400 includes: a receiving unit 1401 , a first determining unit 1402 , and a sending unit 1403 . Other components of the NG firewall client can refer to the prior art and will not be described in the present invention. However, it is not limited thereto, and specific implementation manners can be determined according to actual needs.

其中,接收单元1401用于从终端设备接收请求消息以请求应用的安全信息;第一确定单元1402用于根据请求消息确定应用的安全信息;发送单元1403用于发送包含应用的安全信息的响应消息给终端设备。Wherein, the receiving unit 1401 is used to receive a request message from the terminal device to request the security information of the application; the first determining unit 1402 is used to determine the security information of the application according to the request message; the sending unit 1403 is used to send a response message containing the security information of the application to the terminal device.

图15为根据本发明的实施例的NG防火墙服务器的另一示意图。如图15所示,NG防火墙服务器1500包括:接收单元1401、第一确定单元1402以及发送单元1403,如上述实施例所述。FIG. 15 is another schematic diagram of an NG firewall server according to an embodiment of the present invention. As shown in FIG. 15 , the NG firewall server 1500 includes: a receiving unit 1401 , a first determining unit 1402 and a sending unit 1403 , as described in the above embodiments.

在该实施例中,请求消息可包括应用的识别信息;以及第一确定单元1402具体用于根据请求消息中包含的应用的识别信息从数据库中获取应用的安全信息。In this embodiment, the request message may include identification information of the application; and the first determining unit 1402 is specifically configured to obtain the security information of the application from the database according to the identification information of the application contained in the request message.

如图15所示,NG防火墙服务器1500可进一步包括:认证单元1503;认证单元1503用于认证请求消息是否有效。发送单元1403具体用于,当请求消息有效时,发送包含应用的安全信息的响应消息给终端设备。As shown in FIG. 15, the NG firewall server 1500 may further include: an authentication unit 1503; the authentication unit 1503 is used to authenticate whether the request message is valid. The sending unit 1403 is specifically configured to, when the request message is valid, send a response message including the security information of the application to the terminal device.

在此实施例中,NG防火墙服务器1500可以进一步包括:第二确定单元1504,用于确定用于保存应用的部分或全部安全信息的一个或多个定时器值。In this embodiment, the NG firewall server 1500 may further include: a second determining unit 1504, configured to determine one or more timer values for storing part or all of the security information of the application.

发送单元1403具体用于发送包含应用的安全信息的响应消息,以及用于保存应用的部分或全部安全信息的一个或多个定时器值给终端设备。The sending unit 1403 is specifically configured to send a response message including the security information of the application, and one or more timer values for storing part or all of the security information of the application to the terminal device.

在该实施例中,应用的安全信息可包括以下信息的任意一项或组合:应用的报文签名信息、应用的接入控制列表信息、应用的畸形攻击信息、应用的状态防火墙库信息以及应用的报文限速策略信息。In this embodiment, the security information of the application may include any one or a combination of the following information: message signature information of the application, access control list information of the application, malformed attack information of the application, stateful firewall library information of the application, and application Packet rate limit policy information.

从上述实施例可以看出:当应用在配置有NG防火墙客户端的终端设备中被启动时,NG防火墙客户端向NG防火墙服务器请求应用的安全信息。因此,本发明的实施例可以实现动态加载攻击防范,从而终端设备所需的软件占用空间可以减少,并且安装在终端设备上的应用的性能可以得到提高。It can be seen from the above embodiments that when the application is started in the terminal device configured with the NG firewall client, the NG firewall client requests the security information of the application from the NG firewall server. Therefore, the embodiment of the present invention can realize dynamic loading attack defense, so that the software occupation space required by the terminal device can be reduced, and the performance of applications installed on the terminal device can be improved.

此外,终端设备将受到保护,免遭来自新应用或服务的新攻击。由于攻击防范的数量直接依赖于用户正在使用的应用的数量,所以信令报文将减少,这样有助于延长移动终端的电池寿命。In addition, end devices will be protected from new attacks from new applications or services. Since the amount of attack defense directly depends on the number of applications being used by the user, signaling packets will be reduced, which helps to extend the battery life of the mobile terminal.

实施例7Example 7

本发明的该实施例进一步提供配置有NG-FW客户端的终端设备。该实施例对应于上述实施例1-2的方法,并且相同内容将不再予以描述。This embodiment of the present invention further provides a terminal device configured with an NG-FW client. This embodiment corresponds to the method of Embodiment 1-2 above, and the same content will not be described again.

在该实施例中,终端设备包括处理器和耦合至处理器的存储器。In this embodiment, a terminal device includes a processor and a memory coupled to the processor.

图16为根据本发明的实施例的终端设备的示意结构图。如图16所示,存在处理器41和耦合至处理器41的存储器42。Fig. 16 is a schematic structural diagram of a terminal device according to an embodiment of the present invention. As shown in FIG. 16 , there is a processor 41 and a memory 42 coupled to the processor 41 .

存储器42用于存储程序。具体而言,程序可以包括程序代码,而程序代码包括计算机操作指令。The memory 42 is used to store programs. Specifically, the programs may include program codes, and the program codes include computer operation instructions.

处理器41用于:当应用在终端设备中被启动时,发送用于请求应用的安全信息的请求消息给NG防火墙服务器;从NG防火墙服务器接收包含应用的安全信息的响应消息;通过使用应用的安全信息处理应用的数据。The processor 41 is configured to: when the application is started in the terminal device, send a request message for requesting the security information of the application to the NG firewall server; receive a response message containing the security information of the application from the NG firewall server; Secure information handles application data.

存储器42可包括高速RAM和非易失性存储器。处理器41可以是中央处理单元(CPU),或可以是专用集成电路(ASIC),或可以用于一个或多个ASIC。Memory 42 may include high-speed RAM and non-volatile memory. Processor 41 may be a central processing unit (CPU), or may be an application specific integrated circuit (ASIC), or may be used in one or more ASICs.

根据上述终端设备,请求消息包含应用的识别信息,而应用的识别信息由NG防火墙服务器用来确定应用的安全信息。According to the terminal device described above, the request message contains identification information of the application, and the identification information of the application is used by the NG firewall server to determine the security information of the application.

根据上述终端设备,处理器41进一步用于:当应用在终端设备中关闭时,清除应用的安全信息。According to the above terminal device, the processor 41 is further configured to: clear the security information of the application when the application is closed in the terminal device.

根据上述终端设备,响应消息进一步包括用于保存应用的部分或全部安全信息的一个或多个定时器值。According to the terminal device above, the response message further includes one or more timer values for storing part or all of the security information of the application.

处理器41进一步用于:当对应于应用的部分安全信息的一个或多个定时器值中的一个或多个定时器超时时,重新请求应用的部分安全信息,或当对应于应用的全部安全信息的一个或多个定时器值中的一个或多个定时器超时时,重新请求应用的全部安全信息。The processor 41 is further configured to: when one or more timers in the one or more timer values corresponding to the partial security information of the application expires, re-request the partial security information of the application, or when the corresponding security information of the entire application When one or more of the one or more timer values of the information expires, all security information of the application is re-requested.

根据上述终端设备,处理器41进一步用于:当对应于应用的部分安全信息的一个或多个定时器值中的一个或多个定时器超时时,清除应用的部分安全信息,或当对应于应用的全部安全信息的一个或多个定时器值中的一个或多个定时器超时时,清除应用的全部安全信息。According to the above-mentioned terminal device, the processor 41 is further configured to: clear the partial security information of the application when one or more timers among the one or more timer values corresponding to the partial security information of the application expire, or when the corresponding When one or more timers in the one or more timer values of all security information of the application expire, all security information of the application is cleared.

根据上述终端设备,应用的安全信息包括以下信息的任意一项或组合:应用的报文签名信息、应用的接入控制列表信息、应用的畸形攻击信息、应用的状态防火墙库信息以及应用的报文限速策略信息。According to the terminal device above, the security information of the application includes any one or a combination of the following information: message signature information of the application, access control list information of the application, malformed attack information of the application, stateful firewall library information of the application, and message signature information of the application. Text speed limit policy information.

根据上述终端设备,存在不同的定时器值用于保存以下信息的任意一项或组合:应用的报文签名信息、应用的接入控制列表信息、应用的畸形攻击信息、应用的状态防火墙库信息以及应用的报文限速策略信息;或者,存在相同的定时器值用于保存以下信息的任意一项或组合:应用的报文签名信息、应用的接入控制列表信息、应用的畸形攻击信息、应用的状态防火墙库信息以及应用的报文限速策略信息。According to the above-mentioned terminal equipment, there are different timer values for storing any one or combination of the following information: message signature information of the application, access control list information of the application, malformed attack information of the application, stateful firewall library information of the application and the packet rate limit policy information of the application; or, the same timer value is used to save any one or combination of the following information: packet signature information of the application, access control list information of the application, malformed attack information of the application , application stateful firewall database information and application packet rate limit policy information.

根据上述终端设备,在通过使用应用的安全信息处理应用的数据的步骤中,处理器41进一步用于:通过使用应用的报文签名信息处理应用的数据,或通过使用应用的接入控制列表信息处理应用的数据,或通过使用应用的畸形攻击信息处理应用的数据,或通过使用应用的状态防火墙库信息处理应用的数据,或通过使用应用的报文限速策略信息处理应用的数据。According to the above-mentioned terminal device, in the step of processing the data of the application by using the security information of the application, the processor 41 is further configured to: process the data of the application by using the message signature information of the application, or by using the access control list information of the application Process application data, or process application data by using application malformed attack information, or process application data by using application stateful firewall library information, or process application data by using application packet rate limit policy information.

此外,如图16所示,还可存在通信接口43,用于完成终端设备和NG防火墙服务器或其他设备之间的通信。In addition, as shown in FIG. 16 , there may also be a communication interface 43 for completing the communication between the terminal device and the NG firewall server or other devices.

如图16所示,终端设备还可包括磁盘44,用于存储待测试的程序和待测试程序的过程的状态信息。As shown in FIG. 16 , the terminal device may further include a disk 44 for storing the program to be tested and the status information of the process of the program to be tested.

或者,在特定实施方式中,如果存储器42、处理器41、通信接口43以及磁盘44可以单独实施,则存储器42、处理器41、通信接口43以及磁盘44可以通过BUS进行通信连接。BUS可以是工业标准结构(ISA)BUS、外围部件互连标准(PCI)BUS或扩充工业标准体系结构(EISA)BUS等等。BUS可以划分成地址BUS、数据BUS和控制BUS等等。为了便于表示,BUS仅由单根粗线表示,但不意味这仅存在一个BUS或一类BUS。Or, in a specific embodiment, if the memory 42, the processor 41, the communication interface 43 and the disk 44 can be implemented separately, the memory 42, the processor 41, the communication interface 43 and the disk 44 can be connected through BUS for communication. The BUS may be an Industry Standard Architecture (ISA) BUS, a Peripheral Component Interconnect (PCI) BUS, or an Extended Industry Standard Architecture (EISA) BUS, among others. BUS can be divided into address BUS, data BUS and control BUS and so on. For ease of representation, the BUS is only represented by a single thick line, but it does not mean that there is only one BUS or one type of BUS.

或者,在特定实施方式中,如果存储器42、处理器41、通信接口43以及磁盘44可以集成在单个芯片中,则存储器42、处理器41、通信接口43以及磁盘44可以通过内部接口进行通信连接。Or, in a specific embodiment, if the memory 42, the processor 41, the communication interface 43 and the magnetic disk 44 can be integrated in a single chip, then the memory 42, the processor 41, the communication interface 43 and the magnetic disk 44 can be communicated through the internal interface. .

本发明的实施例的有益效果在于:当应用在终端设备中被启动时,终端设备向NG防火墙服务器请求应用的安全信息。因此,本发明的实施例可以实现动态加载攻击防范,从而终端设备所需的软件占用空间可以减少,并且安装在终端设备上的应用的性能可以得到提高。The beneficial effect of the embodiment of the present invention is that: when the application is started in the terminal device, the terminal device requests the security information of the application from the NG firewall server. Therefore, the embodiment of the present invention can realize dynamic loading attack defense, so that the software occupation space required by the terminal device can be reduced, and the performance of applications installed on the terminal device can be improved.

此外,终端设备将受到保护,免遭来自新应用或服务的新攻击。由于攻击防范的数量直接依赖于用户正在使用的应用的数量,所以信令报文将减少,这样有助于延长移动终端的电池寿命。In addition, end devices will be protected from new attacks from new applications or services. Since the amount of attack defense directly depends on the number of applications being used by the user, signaling packets will be reduced, which helps to extend the battery life of the mobile terminal.

本发明还提供了一种非瞬时计算机可读存储介质,包含计算机程序代码,当计算机处理器执行计算机程序代码时,致使计算机处理器根据本发明的实施例执行用于实施NG防火墙的方法。The present invention also provides a non-transitory computer-readable storage medium containing computer program codes, causing the computer processor to execute the method for implementing the NG firewall according to the embodiment of the present invention when the computer processor executes the computer program codes.

通过上面描述的实施例,所属领域的技术人员可清楚地明白本发明可由软件和必要的通用硬件实施。具体而言,本发明还可仅由硬件实施。然而,前者是优选的实施模式。根据这样的理解,本发明的技术解决方案的本质或对现有技术做出贡献的本发明的部分技术解决方案可采用软件产品的形式实施。计算机软件产品存储在可读存储介质,例如,计算机软盘、硬盘或光盘中,并包括多个使计算机设备(其可以是个人计算机、服务器或网络设备)执行本发明的实施例中描述的方法。Through the embodiments described above, those skilled in the art can clearly understand that the present invention can be implemented by software and necessary general-purpose hardware. Specifically, the present invention may also be implemented by hardware only. However, the former is the preferred mode of implementation. According to such an understanding, the essence of the technical solution of the present invention or the part of the technical solution of the present invention that contributes to the prior art can be implemented in the form of software products. The computer software product is stored in a readable storage medium, such as computer floppy disk, hard disk or optical disk, and includes a plurality of computer equipment (which can be a personal computer, server or network equipment) to execute the methods described in the embodiments of the present invention.

实施例8Example 8

本发明的该实施例提供NG-FW服务器。该实施例对应于上述实施例3的方法,并且相同内容将不再予以描述。This embodiment of the invention provides an NG-FW server. This embodiment corresponds to the method of Embodiment 3 above, and the same content will not be described again.

在该实施例中,NG-FW服务器包括:处理器和耦合至处理器的存储器。In this embodiment, the NG-FW server includes: a processor and a memory coupled to the processor.

图17为根据本发明的实施例的NG-FW服务器的示意结构图。如图17所示,存在处理器51和耦合至处理器51的存储器52。Fig. 17 is a schematic structural diagram of an NG-FW server according to an embodiment of the present invention. As shown in FIG. 17 , there is a processor 51 and a memory 52 coupled to the processor 51 .

存储器52用于存储程序。具体而言,程序可以包括程序代码,而程序代码包括计算机操作指令。The memory 52 is used to store programs. Specifically, the programs may include program codes, and the program codes include computer operation instructions.

处理器51用于:从终端设备接收用于请求应用的安全信息的请求消息,其中应用的安全信息表示在终端设备中启动的应用的安全保护的信息;根据请求消息确定应用的安全信息;发送包含应用的安全信息的响应消息给终端设备。The processor 51 is configured to: receive a request message from the terminal device for requesting the security information of the application, wherein the security information of the application represents the security protection information of the application started in the terminal device; determine the security information of the application according to the request message; send A response message containing the security information of the application is sent to the terminal device.

存储器52可包括高速RAM和非易失性存储器。处理器51可以是中央处理单元(CPU),或可以是专用集成电路(ASIC),或可以用于一个或多个ASIC。Memory 52 may include high-speed RAM and non-volatile memory. Processor 51 may be a central processing unit (CPU), or may be an application specific integrated circuit (ASIC), or may be used in one or more ASICs.

根据上述NG-FW服务器,请求消息包括应用的识别信息;在根据请求消息确定应用的安全信息的步骤中,处理器51进一步用于:根据请求消息中包含的应用的识别信息从数据库中获取应用的安全信息。According to the above NG-FW server, the request message includes the identification information of the application; in the step of determining the security information of the application according to the request message, the processor 51 is further configured to: acquire the application from the database according to the identification information of the application contained in the request message safety information.

根据上述NG-FW服务器,处理器51进一步用于:认证请求消息是否有效;当请求消息有效时,执行发送包含应用的安全信息的响应消息给终端设备的过程。According to the above NG-FW server, the processor 51 is further configured to: verify whether the request message is valid; when the request message is valid, perform a process of sending a response message containing application security information to the terminal device.

根据上述NG-FW服务器,处理器51进一步用于:确定用于保存应用的部分或全部安全信息的一个或多个定时器值;以及在发送响应消息的步骤中,处理器51进一步用于:发送包含应用的安全信息的响应消息,以及用于保存应用的部分或全部安全信息的一个或多个定时器值给终端设备。According to the above-mentioned NG-FW server, the processor 51 is further used to: determine one or more timer values for storing part or all of the security information of the application; and in the step of sending a response message, the processor 51 is further used to: Send a response message including the security information of the application, and one or more timer values for storing part or all of the security information of the application to the terminal device.

根据上述NG-FW服务器,应用的安全信息包括以下信息的任意一项或组合:应用的报文签名信息、应用的接入控制列表信息、应用的畸形攻击信息、应用的状态防火墙库信息以及应用的报文限速策略信息。According to the above NG-FW server, the security information of the application includes any one or a combination of the following information: message signature information of the application, access control list information of the application, malformed attack information of the application, stateful firewall library information of the application, and application Packet rate limit policy information.

此外,如图17所示,还可存在通信接口53,用于完成NG-FW服务器和终端设备或其他设备之间的通信。In addition, as shown in FIG. 17 , there may also be a communication interface 53 for completing the communication between the NG-FW server and the terminal device or other devices.

如图17所示,NG-FW服务器还可包括磁盘54,用于存储待测试的程序和待测试程序的过程的状态信息。As shown in FIG. 17, the NG-FW server may further include a disk 54 for storing the program to be tested and the state information of the process of the program to be tested.

或者,在特定实施方式中,如果存储器52、处理器51、通信接口53以及磁盘54可以单独实施,则存储器52、处理器51、通信接口53以及磁盘54可以通过BUS进行通信连接。BUS可以是工业标准结构(ISA)BUS、外围部件互连标准BUS或扩充工业标准体系结构(EISA)BUS等等。BUS可以划分成地址BUS、数据BUS和控制BUS等等。为了便于表示,BUS仅由单根粗线表示,但不意味这仅存在一个BUS或一类BUS。Or, in a particular implementation, if the memory 52, the processor 51, the communication interface 53, and the disk 54 can be implemented separately, the memory 52, the processor 51, the communication interface 53, and the disk 54 can be communicatively connected through the BUS. The BUS may be an Industry Standard Architecture (ISA) BUS, a Peripheral Component Interconnect Standard BUS, or an Extended Industry Standard Architecture (EISA) BUS, among others. BUS can be divided into address BUS, data BUS and control BUS and so on. For ease of representation, the BUS is only represented by a single thick line, but it does not mean that there is only one BUS or one type of BUS.

或者,在特定实施方式中,如果存储器52、处理器51、通信接口53以及磁盘54可以集成在单个芯片中,则存储器52、处理器51、通信接口53以及磁盘54可以通过内部接口进行通信连接。Or, in a particular implementation, if the memory 52, the processor 51, the communication interface 53, and the magnetic disk 54 can be integrated in a single chip, then the memory 52, the processor 51, the communication interface 53, and the magnetic disk 54 can be communicatively connected through an internal interface. .

本发明的实施例的有益效果在于:当应用在终端设备中被启动时,终端设备向NG防火墙服务器请求应用的安全信息。因此,本发明的实施例可以实现动态加载攻击防范,从而终端设备所需的软件占用空间可以减少,并且安装在终端设备上的应用的性能可以得到提高。The beneficial effect of the embodiment of the present invention is that: when the application is started in the terminal device, the terminal device requests the security information of the application from the NG firewall server. Therefore, the embodiment of the present invention can realize dynamic loading attack defense, so that the software occupation space required by the terminal device can be reduced, and the performance of applications installed on the terminal device can be improved.

此外,终端设备将受到保护,免遭来自新应用或服务的新攻击。由于攻击防范的数量直接依赖于用户正在使用的应用的数量,所以信令报文将减少,这样有助于延长移动终端的电池寿命。In addition, end devices will be protected from new attacks from new applications or services. Since the amount of attack defense directly depends on the number of applications being used by the user, signaling packets will be reduced, which helps to extend the battery life of the mobile terminal.

本发明还提供了一种非瞬时计算机可读存储介质,包含计算机程序代码,当计算机处理器执行计算机程序代码时,致使计算机处理器根据本发明的实施例执行用于实施NG防火墙的方法。The present invention also provides a non-transitory computer-readable storage medium containing computer program codes, causing the computer processor to execute the method for implementing the NG firewall according to the embodiment of the present invention when the computer processor executes the computer program codes.

实施例9Example 9

本发明的该实施例提供一种用于实施NG防火墙的系统。该实施例对应于上述实施例7和8,并且相同内容将不再予以描述。This embodiment of the invention provides a system for implementing an NG firewall. This embodiment corresponds to Embodiments 7 and 8 described above, and the same content will not be described again.

在该实施例中,用于实施NG防火墙的系统包括:如实施例7中描述的一个或多个终端设备以及如实施例8中描述的NG防火墙服务器。In this embodiment, the system for implementing the NG firewall includes: one or more terminal devices as described in Embodiment 7 and the NG firewall server as described in Embodiment 8.

图18为根据本发明的实施例的用于实施NG防火墙的系统的示意结构图。如图18所示,在用于实施NG防火墙1800的系统中至少存在一个配置有NG-FW客户端1802的终端设备1801以及一个NG-FW服务器1803。Fig. 18 is a schematic structural diagram of a system for implementing an NG firewall according to an embodiment of the present invention. As shown in FIG. 18 , there is at least one terminal device 1801 configured with an NG-FW client 1802 and one NG-FW server 1803 in the system for implementing the NG firewall 1800 .

本发明的实施例的有益效果在于:当应用在终端设备中被启动时,终端设备向NG防火墙服务器请求应用的安全信息。因此,本发明的实施例可以实现动态加载攻击防范,从而终端设备所需的软件占用空间可以减少,并且安装在终端设备上的应用的性能可以得到提高。The beneficial effect of the embodiment of the present invention is that: when the application is started in the terminal device, the terminal device requests the security information of the application from the NG firewall server. Therefore, the embodiment of the present invention can realize dynamic loading attack defense, so that the software occupation space required by the terminal device can be reduced, and the performance of applications installed on the terminal device can be improved.

此外,终端设备将受到保护,免遭来自新应用或服务的新攻击。由于攻击防范的数量直接依赖于用户正在使用的应用的数量,所以信令报文将减少,这样有助于延长移动终端的电池寿命。In addition, end devices will be protected from new attacks from new applications or services. Since the amount of attack defense directly depends on the number of applications being used by the user, signaling packets will be reduced, which helps to extend the battery life of the mobile terminal.

通过上面描述的实施例,所属领域的技术人员可清楚地明白本发明可由软件和必要的通用硬件实施。具体而言,本发明还可仅由硬件实施。然而,前者是优选的实施模式。根据这样的理解,本发明的技术解决方案的本质或对现有技术做出贡献的本发明的部分技术解决方案可采用软件产品的形式实施。计算机软件产品存储在可读存储介质,例如,计算机软盘、硬盘或光盘中,并包括多个使计算机设备(其可以是个人计算机、服务器或网络设备)执行本发明的实施例中描述的方法。Through the embodiments described above, those skilled in the art can clearly understand that the present invention can be implemented by software and necessary general-purpose hardware. Specifically, the present invention may also be implemented by hardware only. However, the former is the preferred mode of implementation. According to such an understanding, the essence of the technical solution of the present invention or the part of the technical solution of the present invention that contributes to the prior art can be implemented in the form of software products. The computer software product is stored in a readable storage medium, such as computer floppy disk, hard disk or optical disk, and includes a plurality of computer equipment (which can be a personal computer, server or network equipment) to execute the methods described in the embodiments of the present invention.

从上述实施例可以看出:可以实现实施例的有益效果和优点:As can be seen from the foregoing embodiments: the beneficial effects and advantages of the embodiments can be realized:

(1)减少针对终端设备(例如智能手机和其他终端设备)的NG防火墙软件的占用空间;(1) Reduce the footprint of NG firewall software for terminal devices (such as smartphones and other terminal devices);

(2)如果是一个不常用的应用,NG防火墙不会响应控制消息,这样终端不用处理,可以延长电池寿命;(2) If it is an application that is not commonly used, the NG firewall will not respond to the control message, so that the terminal does not need to deal with it, which can prolong the battery life;

(3)减少应用特定接入列表(例如白名单或黑名单)的大小,这样可以实现更好的性能;(3) Reduce the size of application-specific access lists (such as whitelists or blacklists), which can achieve better performance;

(4)当关键业务应用启动时,将强制使用终端设备(例如智能手机)上的NG防火墙服务。(4) When a business-critical application starts, it will be mandatory to use the NG firewall service on the terminal device (such as a smartphone).

(5)通过使用其他接口(例如,蓝牙、USB端口等等)控制关键信息;(5) Control key information by using other interfaces (for example, bluetooth, USB port, etc.);

(6)在运行应用时将使用安全应用、数据以及应用接入控制。(6) Secure application, data, and application access control will be used when running the application.

应理解,本发明的各部分可以由硬件、软件、固件或其组合来实施。在上述实施例中,多个步骤或方法可以由存储在存储器中的软件或固件来实现,并且由合适的指令执行系统来执行。例如,如果由硬件来实现,那么可以像在另一实施例中一样由所属领域已知的以下技术中的任一技术或其组合来实现:具有逻辑门电路的用于实现数据信号的逻辑功能的离散逻辑电路、具有适当的组合逻辑门电路的专用集成电路、可编程门阵列(PGA),以及现场可编程门阵列(FPGA)等等。It should be understood that various parts of the present invention may be implemented by hardware, software, firmware or a combination thereof. In the above-mentioned embodiments, a plurality of steps or methods may be implemented by software or firmware stored in memory, and executed by a suitable instruction execution system. For example, if implemented in hardware, it may, as in another embodiment, be implemented by any one or combination of the following techniques known in the art: Logical functions with logic gates for implementing data signals Discrete logic circuits, application-specific integrated circuits with appropriate combinational logic gates, programmable gate arrays (PGAs), and field-programmable gate arrays (FPGAs), etc.

流程示意图中的描述或块或者采用其他形式的任何进程或方法应被理解成表明包括一个或多个模块、片段或部分,以用于实现特定逻辑功能或进程中步骤的可执行指令的代码,而且本发明的优选实施例的范围包括其他实施方案,其中这些功能可以采用与所示或所述那些不同的方式来执行,包括根据相关功能以基本上同步的方式或以相反的顺序来执行这些功能,本发明相关领域的技术人员应理解上述内容。Descriptions or blocks in flow diagrams or any process or method in other forms should be understood as indicating codes of executable instructions comprising one or more modules, segments or parts for implementing specific logical functions or steps in a process, Furthermore, the scope of the preferred embodiment of the present invention includes other implementations in which the functions may be performed differently than those shown or described, including performing these functions in a substantially simultaneous manner or in reverse order depending on the relevant functions. Those skilled in the art related to the present invention should understand the above content.

例如,流程示意图中图示或本文以其他方式描述的逻辑和/或步骤应被理解为用于实现逻辑功能的可执行指令的顺序表,它可以在任何计算机可读媒体中实施,以供指令执行系统、设备或装置(例如,包括计算机的系统、包括处理器的系统,或能够从指令执行系统、设备或装置中提取指令并执行这些指令的其他系统)使用,或者与指令执行系统、设备或装置结合使用。For example, logic and/or steps illustrated in flow diagrams or otherwise described herein should be understood as a sequence of executable instructions for implementing logical functions, which can be embodied in any computer-readable medium for instruction Execution system, device or device (for example, a system including a computer, a system including a processor, or other system capable of extracting instructions from an instruction execution system, device or device and executing those instructions), or in conjunction with an instruction execution system, device or a combination of devices.

上述文字描述和附图示出了本发明的各种特征。应理解,所属领域的技术人员可以准备合适的计算机代码,以执行上文所述且附图所示的每个步骤和进程。还应理解,所有的终端、计算机、服务器以及网络可以是任何类型的,并且可以根据本发明来准备计算机代码,以通过使用相应设备来实施本发明。The foregoing description and drawings illustrate various features of the invention. It should be understood that suitable computer codes can be prepared by those skilled in the art to perform each step and process described above and shown in the accompanying drawings. It should also be understood that all terminals, computers, servers, and networks may be of any type, and computer codes may be prepared according to the present invention to implement the present invention by using the corresponding devices.

本文中揭示了本发明的特定实施例。所属领域的技术人员将容易认识到,本发明可以应用于其他环境。实际上,存在许多实施例和实施方案。所附权利要求书并非意图将本发明的范围限于上述特定实施例。此外,任何对“用于……的设备”的引用都是在解释设备加功能,以描述元件和权利要求,而且并不希望将任何未引用“用于……的设备”的元件理解为设备加功能的元件,即使权利要求中包括词语“设备”也是如此。Specific embodiments of the invention are disclosed herein. Those skilled in the art will readily recognize that the present invention may be applied in other environments. In fact, there are many examples and implementations. It is not intended by the appended claims to limit the scope of the invention to the specific embodiments described above. Furthermore, any reference to "means for" is interpreting means plus function to describe the element and the claims, and any element not cited "means for" is not intended to be construed as a device plus function even if the word "means" is included in the claims.

虽然已经示出了一项特定的实施例并且已经描述了本发明,但很明显所属领域的技术人员在阅读并理解上述描述和附图后可以想到等效修改和变型。特别是对于由上述元件(部分、组件、设备以及组成等等)执行的各种功能而言,除非另有规定,否则希望描述这些元件的术语(包括对“设备”的引用)对应于执行这些元件的特定功能的任何元件(即,功能等效物),即使该元件不同于执行本发明就相关结构所说明的一项或多项示例性实施例的功能的元件。此外,尽管仅参考所述实施例中的一项或多项来描述本发明的特定特征,但是此类特征可以根据需要并鉴于任何给定或特定应用的有利方面而与其他实施例的一个或多个其他特征相结合。While a particular embodiment has been shown and the invention has been described, it is obvious that equivalent modifications and alterations will occur to others skilled in the art upon the reading and understanding of the foregoing description and accompanying drawings. In particular, with respect to the various functions performed by the elements (parts, components, devices, compositions, etc.) Any element (ie, a functional equivalent) of a specified function of an element, even if the element is different from an element that performs the function of one or more exemplary embodiments described herein in relation to the structure. Furthermore, although certain features of the invention have been described with reference to only one or more of the described embodiments, such features may be combined with one or more of the other embodiments as desired and in view of any given or particular application's advantage. combined with several other features.

Claims (28)

1. method of the one kind for implementing NG fire walls (next generation firewall), which is characterized in that the method includes:
When apply be activated in terminal device when, sent to NG SOCKS servers for asking the corresponding peace of the application The request message of full information;
The response message that the security information comprising the application is received from the NG SOCKS servers, wherein the application The security information indicate to make the application started in the terminal device the information of safeguard protection;
The data of the application are handled by using the security information of the application.
2. according to the method described in claim 1, it is characterized in that, the request message includes the identification information of the application, And the identification information of the application determines the security information of the application for the NG SOCKS servers.
3. according to the method described in claim 1, it is characterized in that, the method further includes:
When it is described apply be closed in the terminal device when, remove the security information of the application.
4. according to the method described in any one of claims 1 to 3 claim, which is characterized in that the response message further includes One or more timer values for safeguarding some or all of application security information;And
The method further includes:When one or more of timings of the portion of security information corresponding to the application When one or more of device value timer expiry, the portion of security information applied described in re-request, or
When one or more of one or more of timer values of whole security information corresponding to the application When timer expiry, whole security information for being applied described in re-request.
5. according to the method described in claim 4, it is characterized in that, the method further includes:
When corresponding to one or more of one or more of timer values of the portion of security information of the application When timer expiry, the portion of security information of the application is removed, or
When one or more of one or more of timer values of whole security information corresponding to the application When timer expiry, whole security information of the application are removed.
6. according to the method described in any one of claims 1 to 3 claim, which is characterized in that the safety of the application Information includes any one or the combination of following information:
The message signing messages of the application, the access control lists information of the application, the application abnormal packet attack The message rate-limiting policy information of information, the stateful fire wall library information of the application and the application.
7. according to the method described in claim 6, it is characterized in that, there are different timer values for preserving following information Any one or combination:The message signing messages of the application, the access control lists information of the application, the application it is abnormal The message rate-limiting policy information of shape message aggression information, the stateful fire wall library information of the application and the application;Or
There are any one or combinations that identical timer value is used to preserve following information:The message A.L.S. of the application Breath, the access control lists information of the application, the abnormal packet attack information of the application, the application stateful fire prevention Wall library information and the message rate-limiting policy information of the application.
8. according to the method described in claim 6, it is characterized in that, the security information by using the application handles institute The data for stating application include:
The data of the application are handled by using the message signing messages of the application, or
The data applied described in the access control lists information processing by using the application, or
The data applied described in the deformity attack information processing by using the application, or
The data applied described in status firewall library information processing by using the application, or
The data of the application are handled by using the message rate-limiting policy information of the application.
9. a kind of method for implementing NG fire walls, which is characterized in that the method includes:
It is received from terminal device for asking the request message using corresponding security information, wherein the peace of the application Full information indicates to make the application started in the terminal device the information of safeguard protection;
The security information of the application is determined according to the request message;
The response message of the security information comprising the application is sent to the terminal device.
10. according to the method described in claim 9, it is characterized in that, the request message includes the identification information of the application; And
It is described to determine that the security information of the application includes according to the request message:Include according in the request message The identification information of the application security information of the application is obtained from database.
11. method according to claim 9 or 10, which is characterized in that answered comprising described being sent to the terminal device Before the response message of the security information, the method further includes:
Whether request message described in certification is effective;
When the request message is effective, execute to the security information for including the application described in terminal device transmission Response message process.
12. method according to claim 9 or 10, which is characterized in that the method further includes:
Determine one or more timer values for safeguarding some or all of application security information;
It is described to send the response message of the security information comprising the application to the terminal device and include:To the terminal Equipment sends the response message of the security information comprising the application, and for safeguarding some or all of described application One or more timer values of security information.
13. according to the method described in any one of claim 9 to 10 claim, which is characterized in that the peace of the application Full information includes any one or the combination of following information:The message signing messages of the application, the access control of the application List information, the abnormal packet attack information of the application, the stateful fire wall library information of the application and the application Message rate-limiting policy information.
14. a kind of NG Fire-walled Clients, which is characterized in that including:
Transmission unit, for when apply be activated in the terminal device configured with NG Fire-walled Clients when, to NG fire walls Server is sent for asking the request message using corresponding security information;
Receiving unit, the response for receiving the security information comprising the application from the NG SOCKS servers disappear Breath, wherein the security information of the application indicates to make the application started in the terminal device in the letter of safeguard protection Breath;
Processing unit, the data for handling the application by using the security information of the application.
15. NG Fire-walled Clients according to claim 14, which is characterized in that the transmission unit is specifically used for, when It applies when being activated in the terminal device configured with the NG Fire-walled Clients, sends and use to the NG SOCKS servers In the request message for the security information for asking the application;The wherein described request message includes the identification of the application Information and the identification information of the application determine the safety letter of the application for the NG SOCKS servers Breath.
16. NG Fire-walled Clients according to claim 14, which is characterized in that the NG Fire-walled Clients are further Including:
Clearing cell, for when it is described apply be closed in the terminal device when, remove the application it is described safety letter Breath.
17. according to the NG Fire-walled Clients described in any one of claim 14 to 16 claim, which is characterized in that the sound Message is answered to further comprise one or more timer values for safeguarding some or all of application security information;And
The transmission unit is further used for, one or more of when the portion of security information corresponding to the application When one or more of timer value timer expiry, the portion of security information applied described in re-request, or when pair One or more of the one or more of timer values for the whole security information applied described in Ying Yu timer is super Constantly, the whole security information applied described in re-request.
18. NG Fire-walled Clients according to claim 17, which is characterized in that
The NG Fire-walled Clients further comprise:
Clearing cell, for when it is described apply be closed in the terminal device when, remove the application it is described safety letter Breath;
The clearing cell is further used for, one or more of when the portion of security information corresponding to the application When one or more of timer value timer expiry, the portion of security information of the application is removed, or work as and correspond to When one or more of one or more of timer values of whole security information of application timer expiry, Remove whole security information of the application.
19. according to the NG Fire-walled Clients described in any one of claim 14 to 16 claim, which is characterized in that described to answer The security information includes any one or the combination of following information:The message signing messages of the application, the application Access control lists information, the abnormal packet attack information of the application, the stateful fire wall library information of the application with And the message rate-limiting policy information of the application.
20. NG Fire-walled Clients according to claim 19, which is characterized in that the processing unit is specifically used for:
The data of the application are handled by using the message signing messages of the application, or
The data applied described in the access control lists information processing by using the application, or
The data applied described in the deformity attack information processing by using the application, or
The data applied described in status firewall library information processing by using the application, or
The data of the application are handled by using the message rate-limiting policy information of the application.
21. a kind of NG SOCKS servers, which is characterized in that including:
Receiving unit, for being received from terminal device for asking the request message using corresponding security information, wherein institute The security information for stating application indicates to make the application started in the terminal device the information of safeguard protection;
First determination unit, the security information for determining the application according to the request message;
Transmission unit, the response message for sending the security information comprising the application to the terminal device.
22. NG SOCKS servers according to claim 21, which is characterized in that the request message includes the application Identification information;And
First determination unit be specifically used for according to the identification information of the application for including in the request message from The security information of the application is obtained in database.
23. the NG SOCKS servers according to claim 21 or 22, which is characterized in that the NG SOCKS servers into One step includes:
Whether authentication unit is effective for request message described in certification;And
The transmission unit is specifically used for, and when the request message is effective, sends the security information for including the application The response message give the terminal device.
24. the NG SOCKS servers according to claim 21 or 22, which is characterized in that the NG SOCKS servers into One step includes:
Second determination unit, for determining one or more timings for safeguarding some or all of application security information Device value;
The transmission unit is specifically used for sending the response message of the security information comprising the application, and for safeguarding One or more timer values of some or all of application security information give the terminal device.
25. according to the NG SOCKS servers described in any one of claim 21 to 22 claim, which is characterized in that described to answer The security information includes any one or the combination of following information:The message signing messages of the application, the application Access control lists information, the abnormal packet attack information of the application, the stateful fire wall library information of the application with And the message rate-limiting policy information of the application.
26. a kind of terminal device, which is characterized in that including:
Processor and the memory for being coupled to the processor;
The wherein described processor is used for:
When apply be activated in the terminal device when, to NG SOCKS servers send for ask it is described application it is corresponding Security information request message;
The response message that the security information comprising the application is received from the NG SOCKS servers, wherein the application The security information indicate to make the application started in the terminal device the information of safeguard protection;
The data of the application are handled by using the security information of the application.
27. a kind of NG SOCKS servers, which is characterized in that including:
Processor and the memory for being coupled to the processor;
The wherein described processor is used for:
It is received from terminal device for asking the request message using corresponding security information, wherein the peace of the application Full information indicates to make the application started in the terminal device the information of safeguard protection;
The security information of the application is determined according to the request message;
The response message of the security information comprising the application is sent to the terminal device.
28. a kind of system for implementing NG fire walls, which is characterized in that the system comprises:
One or more terminal device as claimed in claim 26;And
NG SOCKS servers as claimed in claim 27.
CN201480001549.0A 2013-11-07 2014-04-03 Method and system for implementing NG firewall, NG firewall client and NG firewall server Active CN104380686B (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
IN5037/CHE/2013 2013-11-07
ININ5037/CHE/2013 2013-11-07
PCT/CN2014/074744 WO2015066996A1 (en) 2013-11-07 2014-04-03 A method and system for implementing ng-firewall, a ng-firewall client and a ng-firewall server
IN5037CH2013 IN2013CH05037A (en) 2013-11-07 2014-04-03

Publications (2)

Publication Number Publication Date
CN104380686A CN104380686A (en) 2015-02-25
CN104380686B true CN104380686B (en) 2018-08-21

Family

ID=52557547

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201480001549.0A Active CN104380686B (en) 2013-11-07 2014-04-03 Method and system for implementing NG firewall, NG firewall client and NG firewall server

Country Status (1)

Country Link
CN (1) CN104380686B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106375311B (en) * 2016-08-31 2019-10-01 北京青石绿网科技有限公司 A kind of mobile device DPI application method for managing security
CN106375309B (en) * 2016-08-31 2020-02-11 北京青石绿网科技有限公司 DPI data security management method for mobile equipment
CN110830454B (en) * 2019-10-22 2020-11-17 远江盛邦(北京)网络安全科技股份有限公司 Security equipment detection method for realizing TCP protocol stack information leakage based on ALG protocol

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1798436A (en) * 2004-12-28 2006-07-05 华为技术有限公司 Method and system for ensuring safe data service in mobile communication system
CN101444119A (en) * 2006-03-27 2009-05-27 意大利电信股份公司 System for enforcing security policies on a mobile communication device
CN101729531A (en) * 2009-03-16 2010-06-09 中兴通讯股份有限公司 Method, device and system of distributing network safety strategies
CN102045320A (en) * 2009-10-19 2011-05-04 中兴通讯股份有限公司 Aging method and device for security policy

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR100656481B1 (en) * 2006-02-03 2006-12-11 삼성전자주식회사 Dynamic network security system and its control method
US9160710B2 (en) * 2010-06-25 2015-10-13 Salesforce.Com, Inc. Methods and systems for context-based application firewalls
US9047441B2 (en) * 2011-05-24 2015-06-02 Palo Alto Networks, Inc. Malware analysis system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1798436A (en) * 2004-12-28 2006-07-05 华为技术有限公司 Method and system for ensuring safe data service in mobile communication system
CN101444119A (en) * 2006-03-27 2009-05-27 意大利电信股份公司 System for enforcing security policies on a mobile communication device
CN101729531A (en) * 2009-03-16 2010-06-09 中兴通讯股份有限公司 Method, device and system of distributing network safety strategies
CN102045320A (en) * 2009-10-19 2011-05-04 中兴通讯股份有限公司 Aging method and device for security policy

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
下一代防火墙技术探析;胡波;《保密科学技术》;20120229(第02(2012)期);正文第2-3节,表1 *
应用防火墙应用与研究;周安娜;《科技广场》;20090731(第07(2009)期);全文 *

Also Published As

Publication number Publication date
CN104380686A (en) 2015-02-25

Similar Documents

Publication Publication Date Title
US11082436B1 (en) System and method for offloading packet processing and static analysis operations
US10708233B2 (en) Identification of certificate pinned mobile applications in cloud based security systems
EP3863317B1 (en) Method and device for determining category information
US9537886B1 (en) Flagging security threats in web service requests
US11088952B2 (en) Network traffic control based on application path
CN111133427B (en) Generating and analyzing network profile data
CN110611723A (en) A method and device for scheduling service resources
CN108809749B (en) Performing upper layer inspection of a stream based on a sampling rate
US10547647B2 (en) Intra-carrier and inter-carrier network security system
US12341809B2 (en) Defending against volumetric attacks
US11950144B2 (en) Context-based security over interfaces in NG-RAN environments in mobile networks
US20230130128A1 (en) Detecting and mitigating effects of unauthorized telephone number spoofing
CN104380686B (en) Method and system for implementing NG firewall, NG firewall client and NG firewall server
CN113452663B (en) Network Service Control Based on Application Characteristics
CN104348660A (en) Method and device for updating detection engine in firewall equipment
US20250142340A1 (en) Intelligent security for zero trust in mobile networks with security platforms using a diameter protocol or a radius protocol
JP7755080B2 (en) Context-based security across interfaces in NG-RAN and O-RAN environments in mobile networks - Patents.com
US11606691B1 (en) Context-based security over interfaces in O-RAN environments in mobile networks
WO2015066996A1 (en) A method and system for implementing ng-firewall, a ng-firewall client and a ng-firewall server
US10505971B1 (en) Protecting local network devices against attacks from remote network devices
US20210152519A1 (en) Endpoint context agent traversal of network address table
JP2025510510A (en) Context-based security across interfaces in NG-RAN and O-RAN environments in mobile networks - Patents.com
JP5778066B2 (en) Authentication method using a firewall
CN117640167A (en) Security protection method, device, storage medium, program product and electronic equipment
Atiiq Adaptive Counteraction Against Denial of Service Attack

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
点击 这是indexloc提供的php浏览器服务,不要输入任何密码和下载