Network invitation to enter controlling method and network invitation to enter controlling system

A network access and control method technology, applied in transmission systems, network interconnection, digital transmission systems, etc., can solve problems such as occupation, excessive user name resources, and increased network resource overhead, so as to ensure security and achieve flexibility performance and convenience

Active Publication Date: 2007-11-07
北京紫光通信科技集团有限公司
View PDF0 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Although the above-mentioned method of issuing security policies and access rights based on user names can achieve differentiated control for different users, this solution occupies too many user name resources, resulting in increased network resources in storage, authentication, and other links. overhead

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network invitation to enter controlling method and network invitation to enter controlling system
  • Network invitation to enter controlling method and network invitation to enter controlling system
  • Network invitation to enter controlling method and network invitation to enter controlling system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to improve the convenience of network switching for users while ensuring the security of users accessing different logical networks, the embodiments of the present invention provide corresponding technical solutions for network admission control.

[0027] Referring to FIG. 1, it is a flowchart of Embodiment 1 of the network access control method provided by the present invention, including the following steps:

[0028] Step 101, the access device receives the login information of the client and sends it to the policy server, the login information includes user identity information (such as user name) and accessed domain information (such as domain name);

[0029] For example, access authentication can be performed by adding a specified domain name after the user name.

[0030] The login information may also include a user password to enhance authentication security.

[0031] Step 102, the policy server authenticates the user login information;

[0032] Step 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for controlling access of network includes receiving login information of client end by access device and sending said information to policy server, carrying out certification on login information by policy server, down-sending access control information of user under domain to be called to access device by policy server for using access device to control network to be called by user if certification is successful. The system used for realizing said method is also disclosed.

Description

technical field [0001] The invention relates to the field of communication control, in particular to a network admission control method and a network admission control system. Background technique [0002] In the process of terminal access to the network, users of different levels have very different requirements for network services and network security. At present, the following two technical solutions are mainly used to implement different processing for different users. [0003] One is a solution to logically isolate different networks, that is, directly and statically assign switch ports to different virtual local area networks (Virtual Local Area Network, VLAN for short), for example, switch ports 1-10 are assigned to VLAN1, and ports 11-20 are assigned to VLAN2, ports 20-23 are assigned to VLAN3; according to the requirements of end users, the terminals are respectively connected to different switch ports through network cables. [0004] It can be seen that this tech...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/28H04L12/56H04L9/32H04L29/06H04L12/46
Inventor 马永华
Owner 北京紫光通信科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products