Network access control method based onuser's account number
A network access control and user account technology, applied in the user's network access control field, can solve the control requirements that cannot achieve user-level control accuracy and hierarchy, network access control is complex and difficult, and other problems, achieve high control accuracy and flexibility. performance, meet the control requirements
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0019] According to the aforementioned analysis of existing user network access control methods, when controlling user network access, the simplest control basis is to pass the authentication as the standard, but because the control accuracy of this standard is too low to meet practical application requirements. In fact, when network access control is performed on users, no matter whether local authentication or remote authentication server authentication is used, the authentication end stores the user authentication and management information. Therefore, once the user passes the network authentication, the network The detailed signing information of the user will be obtained, such as the user account (information that uniquely identifies the user such as the user name or password) and the like. It can be seen that if the user's network access authority can be stored on the authentication side of the network as the user's subscription information, then after the user is authen...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 