Unlock instant, AI-driven research and patent intelligence for your innovation.

Network access control method based onuser's account number

A network access control and user account technology, applied in the user's network access control field, can solve the control requirements that cannot achieve user-level control accuracy and hierarchy, network access control is complex and difficult, and other problems, achieve high control accuracy and flexibility. performance, meet the control requirements

Inactive Publication Date: 2008-11-12
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Because the IP address obtained through the DHCP process is usually different every time a user accesses the Internet, this makes it complicated and difficult to control the user's network access
Although the accuracy of the above control methods has been improved, it still cannot achieve user-level control accuracy and hierarchical control requirements.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access control method based onuser's account number
  • Network access control method based onuser's account number
  • Network access control method based onuser's account number

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] According to the aforementioned analysis of existing user network access control methods, when controlling user network access, the simplest control basis is to pass the authentication as the standard, but because the control accuracy of this standard is too low to meet practical application requirements. In fact, when network access control is performed on users, no matter whether local authentication or remote authentication server authentication is used, the authentication end stores the user authentication and management information. Therefore, once the user passes the network authentication, the network The detailed signing information of the user will be obtained, such as the user account (information that uniquely identifies the user such as the user name or password) and the like. It can be seen that if the user's network access authority can be stored on the authentication side of the network as the user's subscription information, then after the user is authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention discloses one network access control method based on user's account number. User's network access authority is divided into different grades and control groups, different network IP addresses and address sections corresponding to different grades are set, and the corresponding relation between the user's account and the network access grade are set, so that when the user accesses, the user's access authority grade or the control group is obtained based on the user's account and the network access IP address or IP address section corresponding to the user's network access destination address is matched based on the grade or the control group. If the matching result is to allow access, the message is transmitted, or else, the access is rejected. The control method to user's network access is precise and flexible and can meet the requirement of multiple-layered access.

Description

technical field [0001] The invention relates to a user's network access control method. Background technique [0002] In the broadband access server (BAS) of the current broadband network, the forwarding of the broadband data message is inevitably involved, that is, the problem of forwarding control of the message, or the problem of network access control of the user is involved. For example, when it is necessary to restrict users accessing a website with an IP address, if the user accessing the website with the IP address satisfies the restricted conditions, the access operation will be cut off when the user accesses the network. For another example, the operator divides network access into multiple levels according to the needs of operation, and at the same time enables different users to have different levels of network access rights. its network access. In order to achieve the above control requirements, two control methods are mainly used at present: one is the contro...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/24G06F13/00G06F15/16
Inventor 候超管红光王军
Owner HUAWEI TECH CO LTD