SYSTEM AND METHOD FOR PREVENTING HEADER SPOOFING
First Claim
1. A computer-implemented method, comprising:
- receiving, at an session border controller (SBC), a message from a network element, wherein the message is a request for network access and the message comprises a first source information;
identifying, at the session border controller (SBC), an identifier associated with the network element, wherein the identifier corresponds to a second source information;
replacing, at the session border controller (SBC), the first source information in the message received from the network element with the second source information corresponding to the identifier of the network element; and
transmitting, from the session border controller (SBC), the message with the second source information to a proxy.
2 Assignments
0 Petitions
Accused Products
Abstract
A system and method for preventing spoofing including a receiver at a session border controller (SBC) configured to receive a message from a network element, wherein the message is a request for network access and the message comprises a first source information. The system and method may also include one or more processors at the session border controller (SBC) configured to identify an identifier associated with the network element, wherein the identifier corresponds to a second source information, and to replace the first source information in the message received from the network element with the second source information corresponding to the identifier of the network element. The system and method may also include one or more databases configured to store the second source information. The system and method may also include a transmitter at the session border controller (SBC) configured to transmit the message with the second source information to a service provider proxy for granting network access. In another embodiment, network access may be denied in the event it is determined that the first source information in the message received from the network element with the second source information corresponding to the identifier of the network element are different.
47 Citations
21 Claims
-
1. A computer-implemented method, comprising:
-
receiving, at an session border controller (SBC), a message from a network element, wherein the message is a request for network access and the message comprises a first source information; identifying, at the session border controller (SBC), an identifier associated with the network element, wherein the identifier corresponds to a second source information; replacing, at the session border controller (SBC), the first source information in the message received from the network element with the second source information corresponding to the identifier of the network element; and transmitting, from the session border controller (SBC), the message with the second source information to a proxy. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 17)
-
-
11. A computer-implemented system, comprising:
-
a receiver configured to receive a message from a network element, wherein the message is a request for network access and the message comprises a first source information; one or more processors configured to identify an identifier associated with the network element, wherein the identifier corresponds to a second source information, and to replace the first source information in the message received from the network element with the second source information corresponding to the identifier of the network element; one or more databases configured to store the second source information; and a transmitter configured to transmit the message with the second source information to a proxy for granting network access.
-
-
12. A computer-implemented method, comprising:
-
receiving, at a session border controller (SBC), a message from a network element, wherein the message is a request for network access and the message comprises a first source information; identifying, at the session border controller (SBC), a identifier associated with the network element, wherein the identifier corresponds to a second source information; and deny network access in the event it is determined that the first source information in the message received from the network element with the second source information corresponding to the identifier of the network element are different. - View Dependent Claims (13, 14, 15, 16, 18, 19, 20)
-
-
21. A computer-implemented system, comprising:
-
a receiver configured to receive a message from a network element, wherein the message is a request for network access and the message comprises a first source information; one or more processors configured to identify a identifier associated with the network element, wherein the identifier corresponds to a second source information, and to deny network access in the event it is determined that the first source information in the message received from the network element with the second source information corresponding to the identifier of the network element are different.
-
Specification