Network mutual access controlling method
A control method and access control technology, applied in the field of user network mutual access control, can solve the complex and difficult problems of user network mutual access control, and achieve the effect of high control accuracy and flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] According to the aforementioned analysis of existing user network access control methods, when controlling user network mutual access, the simplest control basis is to pass the authentication as the standard, but because the control accuracy of this standard is too low to be meet the requirements of practical applications. In fact, when controlling mutual access to users, whether using local authentication or remote authentication server authentication, the authentication and management information for users is stored at the authentication end. Therefore, once a user passes network authentication, the network The detailed signing information of the user will be obtained, such as the user account (information that uniquely identifies the user such as the user name or password) and the like. It can be seen that if the user's network mutual access authority can be saved as the user's contract information on the authentication side of the network, then after the user is aut...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 