Subdivision method of the user network access style and network system

A network system and user technology, applied in the Internet field, can solve problems such as ignoring users, and achieve the effect of adding business value

Inactive Publication Date: 2007-08-01
HUAWEI TECH CO LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, at present, many users have a need for multi-machine shared Internet access. Simply using the above method to restrict users from multi-machine shared Internet access is equivalent to ignoring the needs of users in this regard, and users may use various methods to break through the restrictions of access providers. , if the access provider can distinguish such users from users with only one computer accessing the Internet and provide differentiated services, it will be able to realize business value-added

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Subdivision method of the user network access style and network system
  • Subdivision method of the user network access style and network system
  • Subdivision method of the user network access style and network system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0043] Firstly, the first embodiment is introduced, using the secure shell SSH (Secure Shell) protocol to establish an encrypted tunnel to realize shared Internet access. The Secure Shell SSH protocol is a family of protocols formulated by the Network Working Group of the Internet Engineering Task Force IETF (Internet Engineering Task Force), whose purpose is to provide secure remote login and other secure network services on non-secure networks . The SSH protocol supports identity authentication and data encryption, and encrypts all transmitted data. There are many ways to implement the SSH protocol, such as open source OpenSSH software, commercial Tectia, SecureCRT and other software. They are relatively simple to configure and use, and they support the compression function, so that the actual transmission efficiency will not be reduced due to the overhead of the SSH protocol.

[0044] Please refer to Figure 3, which is a flow chart of Embodiment 1 of providing encryption ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosed method to detail surfing user type comprises: allocating monitor device to detect user outlet port data message, and disabling user accessing internet if deciding the outlet port as multiple-computer share; for user applying multiple-computer share, providing the enciphered channel built by server and user port to transmit data, and using the server to access network source. This invention can increase business value.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and a network system for subdividing the types of users surfing the Internet. Background technique [0002] At present, many Internet users apply for an access account from the access provider, allowing multiple computers on the internal LAN to share the Internet. LAN multi-computer sharing Internet access is usually carried out by using the Network Address Translation (NAT) method: that is, only one legal Internet Protocol IP (Internet Protocol) address is obtained from the access provider, and each computer on the LAN uses the internal IP address. private network IP address. The private network IP address of each computer in the LAN is converted into the legal IP address of the NAT device or computer at the exit end of the LAN through network address translation, and all computers on the LAN access to Internet Internet are completed through the NAT device or comp...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L12/26H04L12/28H04L9/30H04L29/06
Inventor 陈志民
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products