A method for access terminal and operator binding

A technology for access terminals and operators, applied in network connection, data exchange through path configuration, digital transmission system, etc., to achieve the effect of simple implementation scheme and avoid vicious competition

Active Publication Date: 2012-09-05
XFUSION DIGITAL TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0018] The purpose of the present invention is to provide a method for binding an access terminal to an operator to solve the problem of binding the access terminal to the operator that provides the access terminal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for access terminal and operator binding
  • A method for access terminal and operator binding
  • A method for access terminal and operator binding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] Embodiment 1: Identify the operator's domain name as an identifier

[0046] First of all, the operator pre-stores its domain name in its access terminal, which can be fixed in the code or written in flash in a certain way, and ordinary users cannot modify it.

[0047] During the PPPoE dial-up process, the Modem extracts the domain name field in the user name and compares it with the pre-stored operator domain name, and only allows dialing if the two are consistent.

[0048] In routing mode, the dial-up process is initiated by the Modem. The user name will be configured on the Modem, such as usernamexxx.xx. The Modem needs to obtain the user name dialing from the configuration. Some rules can be set in the program to extract the domain name after the characters are extracted from the user name. The Modem directly judges whether the extracted domain name is the same as the operator's preset domain name during the PPPoE dial-up process.

[0049] Such as figure 1 As shown...

Embodiment 2

[0059] Embodiment 2: The operator superimposes its trademark or other representative character strings with the user name applied for by the user when issuing services, and the operator pre-stores the characteristic character as an identifier in its access terminal, and the user uses this When the access terminal accesses the network, the access terminal extracts the characteristic characters in the user name and compares them with the characteristic characters stored therein, and only when the two are consistent, the subsequent dialing process is allowed.

[0060] First of all, operators pre-store characteristic characters in their access terminals, which can be fixedly written in the code or written in flash in a certain way, and ordinary users cannot modify them.

[0061] The operator superimposes this characteristic character with the user name applied by the user when issuing services, such as username_XXX, where XXX is the characteristic character of the operator.

[006...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The disclosed method for binding the access terminal and provider comprises: an access terminal extracts identifier from user message to compare with the provider identifier stored in terminal, then continuing the dialing procedure if both identifiers are coincidence, or ending the procedure. This invention avoids cut-throat competition among providers, and has no effect on user habit.

Description

technical field [0001] The present invention relates to the technical field of xDSL (Digital Subscriber Line), and specifically relates to the binding technology of an access terminal and an operator in xDSL. Background technique [0002] PPP (Point-to-Point Protocol) provides a whole set of solutions to solve problems such as link establishment, maintenance, removal, upper-layer protocol negotiation, and authentication. The PPP protocol includes several parts: link control protocol LCP (Link Control Protocol), network control protocol NCP (Network Control Protocol) and authentication protocol, the most commonly used authentication protocols include password authentication protocol PAP (Password Authentication Protocol) and challenge handshake Authentication protocol CHAP (Challenge-Handshake Authentication Protocol). [0003] A typical link establishment process is divided into three phases: establishment phase, authentication phase and network negotiation phase. [0004]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L12/28
CPCH04L12/66H04L12/4625H04L12/2859
Inventor 张科
Owner XFUSION DIGITAL TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products