Secondary authentication method and system

A secondary authentication and access authentication technology, applied in the transmission system, user identity/authority verification, data exchange details, etc. fees and other issues

Inactive Publication Date: 2011-03-02
ZTE CORP
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Campus networks and enterprise networks can perform user authentication through multiple methods such as 802.1x and Web Portal, but it is difficult to distinguish the user's access area, that is, the internal and external network, if only one authentication is performed; billing according to the requirements of network separate billing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secondary authentication method and system
  • Secondary authentication method and system
  • Secondary authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The purpose of the present invention is to provide a method that can distinguish the user's access area, that is, the internal and external network. The user performs a corresponding authentication method according to the needs of accessing resources, that is, provides the user with a mode that can choose the secondary authentication: if the user chooses to only authenticate the internal Internet only needs to complete the 802.1x authentication; or at the same time to authenticate the requirements of the internal and external network, the client will automatically complete the secondary authentication, that is, sequentially perform 802.1x and WebPortal authentication, and send the Portal authentication page to the user after successful 802.1x authentication for Portal authentication , and then the authentication server can distinguish the resource access of the user according to the IP address of the access device NAS of the 802.1x authentication of the internal network a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a secondary authentication method, which includes two steps. Firstly, when a user gets online, the internal network authentication is first carried out, then the external network authentication is carried out, and consequently, the user can be billed according to an billing policy of using an internal network; when the user gets offline, the external network authentication is first carried out, then the internal network authentication is carried out, and consequently, the user can be billed according to an billing policy of using an external network. The secondary authentication method of the invention combines the prior 802.1x and Portal authentications, so that administrators can respectively control the resources of internal and external networks and control the user accesses of the resources of internal and external networks according to different rights, and moreover, the invention provides a method and a system for differentiating the user accesses of the resources of internal and external networks, so users can be billed on the basis of different billing policies according to the IP addresses of access devices when users access the resources.

Description

technical field [0001] The present invention relates to the authentication of 802.1x protocol and Web Portal authentication technology, especially when the administrator needs to restrict according to the user's access authority, and the authentication server needs to distinguish the user's access area, that is, the internal and external network, so that the authentication server can adopt different internal and external networks. A secondary authentication method and system for billing by billing policy. Background technique [0002] Campus networks and enterprise networks can perform user authentication through multiple methods such as 802.1x and Web Portal, but it is difficult to distinguish the user's access area, that is, the internal and external network, if only one authentication is performed; Billing according to the requirements of separate billing by the network. [0003] The message flow chart of successful 802.1X user authentication, such as figure 2 Shown, in...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L12/14H04L29/06
Inventor 黄小华卢应华严峰
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products