Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for controlling the user to visit the network at the specific area

A technology for a specific area and user, applied in the field of user login authorization and authentication, it can solve problems such as affecting learning, difficult to guarantee security, and chaotic online management, and achieve the effect of strengthening login management, promoting network security, and promoting learning.

Inactive Publication Date: 2010-06-09
ZTE CORP
View PDF8 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing AAA system, user information authentication mainly focuses on user account numbers and passwords. This system will cause some problems. For example, some student users may browse the Internet for information that is not related to learning when they are in class in the school laboratory. , affecting learning; or some students use laptops to surf the Internet in the teaching building, which will affect the learning of other students. In addition, in some core areas that need to be kept secret, if users who do not have access to the Internet can access the Internet in these areas, they will be Confidential information may be obtained through network monitoring and other methods, causing hidden dangers in network security management
Therefore, the problem of the existing AAA system is that it cannot control the areas where users can access the Internet, resulting in confusion in Internet management and difficulty in ensuring security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling the user to visit the network at the specific area
  • Method and system for controlling the user to visit the network at the specific area
  • Method and system for controlling the user to visit the network at the specific area

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described in detail below with reference to the accompanying drawings and specific embodiments.

[0024] The core idea of ​​the present invention is: this method is divided into a step of setting sub-regional login authentication rules and a step of performing sub-regional login authentication for user login information by the server system according to the rules set above, which are referred to as preset steps and User regional login authentication steps.

[0025] The preset step includes: dividing the login domain, recording the corresponding relationship between all the access servers in the login domain and the login domain, and the relationship can be recorded as a unique attribute of the access server that can be distinguished from other access servers and the login domain. The corresponding relationship between domains, and the user account is bound to the login domain; each corresponding relationship set in the preset steps ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and system for controlling the user accessing the network only at the specified area. The method includes: record the corresponding relationship between the access server and this logon domain, this relation is recorded as the unique attribute of access server and the corresponding relationship with logon domain, and binds the user account number with the logon domain; the user may send the logon authentication information with the user account number to the access server, which may add the unique attribute of this access server in the logon authentication information to generate the authentication information, then sends the authentication information to the service end system, which may take out the unique attribute of access server from the authentication information, if the service end system makes sure that the access server corresponding to the user account number logon domain has the access server taken out from the authentication information, then the sub-area logon authentication of the user may be passed. The invention may effectively prevent the accessing of unauthorized users at the specified area, strengthen the network logon management and enhance the network safety.

Description

technical field [0001] The present invention relates to a method and system for network authentication, authorization and accounting (AAA, Authentication, Authorization, Accounting) management, in particular to a method and system for user login authorization and authentication. Background technique [0002] With the in-depth development of national informatization work, improving the informatization level of the education system has become the focus of current work. The construction of campus network is the key to the informatization construction of education system, especially the construction of campus network in colleges and universities. In the process of informatization construction, campus network can promote teachers and students to improve the level of application of information technology as soon as possible. The campus network provides teachers with an advanced auxiliary teaching tool and a rich library of teaching resources. Professional background knowledge. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F15/16H04L12/28H04L9/32
Inventor 周根华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products