Protection method of network authentication charging information
A technology for network authentication and billing information, applied in metering/billing/accounting devices, secure communication devices, data exchange details, etc. Loss and other issues to achieve the effect of improving reliability and protecting interests
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0018] Since the existing RADIUS server-based authentication and accounting methods for users cannot guarantee the protection of user authentication or accounting information when the link for transmitting authentication or accounting information fails, resulting in user authentication or accounting If the information is lost, normal authentication or accounting operations for users cannot be performed. In fact, the purpose of authentication is to check whether the Internet user is a legitimate user. As long as there is a network node or device that stores user authentication information, the user authentication operation can be realized, rather than through a remote RADIUS server. Similarly, the user's billing information does not have to be transmitted to the remote RADIUS server in real time. At least for services that do not require real-time billing, the billing information can not be transmitted in real time. billing information.
[0019] Therefore, it is entirely possi...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 