Unlock instant, AI-driven research and patent intelligence for your innovation.

Protection method of network authentication charging information

A technology for network authentication and billing information, applied in metering/billing/accounting devices, secure communication devices, data exchange details, etc. Loss and other issues to achieve the effect of improving reliability and protecting interests

Inactive Publication Date: 2009-06-24
HUAWEI TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The defect of the above-mentioned method for authenticating and charging network users is that a single RADIUS server is adopted, so that the authentication and charging of network users are unreliable, which is embodied in the following two aspects:
[0003] 1. If the link between the access device and the RADIUS server fails or the RADIUS server itself fails, the communication between the network access device and the server is interrupted, and the users who have not been online cannot go online because they cannot pass the authentication of the RADIUS server
At this time, for users who are already online, their billing information cannot be sent to the RADIUS server, so after a period of time, the network access device will cut off the user, causing the user to go offline
Similarly, after the above-mentioned failure occurs, the user's billing information (such as online time, traffic, etc.) cannot be sent to the RADIUS server, resulting in inaccurate user billing information, which damages the interests of the operator.
[0004] 2. When the RADIUS server has been running for a long time, if you want to shut down for maintenance, you have to interrupt all services
[0005] It can be seen from the above that the existing method cannot solve the security problem of the user's billing information when the above-mentioned failure occurs, resulting in the loss of the interests of the user or the operator.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method of network authentication charging information

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] Since the existing RADIUS server-based authentication and accounting methods for users cannot guarantee the protection of user authentication or accounting information when the link for transmitting authentication or accounting information fails, resulting in user authentication or accounting If the information is lost, normal authentication or accounting operations for users cannot be performed. In fact, the purpose of authentication is to check whether the Internet user is a legitimate user. As long as there is a network node or device that stores user authentication information, the user authentication operation can be realized, rather than through a remote RADIUS server. Similarly, the user's billing information does not have to be transmitted to the remote RADIUS server in real time. At least for services that do not require real-time billing, the billing information can not be transmitted in real time. billing information.

[0019] Therefore, it is entirely possi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for protecting network authentication and billing information. The method adds user authentication information locally, sets bill pools and cache queues for storing user billing bills, and enables users to perform network access or billing. Time-consuming, if the network authentication and accounting server cannot be used normally, send the user's authentication message to the local, compare with the user authentication information stored locally, after the authentication is passed, store the accounting message in the bill pool. At the end of the user's accounting operation, the user's stop accounting information will be sent to the network authentication and accounting server. If the network authentication and accounting server does not feedback a correct response, the stop accounting information will be saved in the cache queue, and the stop accounting information will be resent. When the number of retransmissions reaches the specified number of times, the transmission will stop; adopting the above scheme can improve the reliability of authentication and accounting information, and protect the interests of both users and operators.

Description

technical field [0001] The invention relates to a method for protecting network information. Background technique [0002] With the development of broadband network technology, how to protect the interests of users without damaging the interests of operators has become more and more concerned by users and operators. fee to achieve. Therefore, in the field of broadband access, how to ensure the accuracy and reliability of network information, such as authentication and billing information, is a matter of great concern to both users and operators. At present, the usual method is to use the remote authentication dial-in user (RADIUS) protocol to authenticate and charge network users. statistics on billing information. The defect of the above-mentioned method for authenticating and charging network users is that a single RADIUS server is adopted, so that the authentication and charging of network users are unreliable, which is embodied in the following two aspects: [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/14H04L9/00
Inventor 逄焕刚周剑光赵玉博颜杨董江如
Owner HUAWEI TECH CO LTD