A right authentication method for network user

An authentication method and user authority technology, which is applied in the field of network user authority authentication, can solve problems such as low scalability, complicated installation, and terminal system restrictions, and achieve the effect of convenient use and low cost

Inactive Publication Date: 2008-05-28
ZTE CORP
View PDF0 Cites 18 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] For this problem, the industry currently adopts a solution, which is to realize user identification and authentication through the cooperation of terminal systems and gateways, routers or switches. However, this method requir

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A right authentication method for network user
  • A right authentication method for network user
  • A right authentication method for network user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] First of all, the network system to which the method of the present invention is applied is described, and the structure is as follows figure 1 As shown, the whole system is composed of user terminal 4 in LAN 1, gateway or routing device 2 between LAN 1 and INTERNER network 2 installed with user authority database and its management system. Among them, the user rights management system has an internal structure such as figure 2 As shown, the system includes a user authority authentication module 21, a network control module 23, a planned task module 22, and a monitoring and filtering module 24, wherein:

[0031] (1) User authority identification module 21: for accepting the authority identification of the user, the user can log in in multiple ways, such as Http, Ftp, Telnet, Upnp, etc., whether the user name and password registered by this module are correct on the one hand, and at the same time Analyze the IP address registered by the user;

[0032] (2) Network cont...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a method of a network user purview certification, which utilizes a built-in user purview database and the gateway or the router (2) of the management system thereof. The method comprises the steps that user information is obtained though a user landing; whether the user information is correct or not is judged, the IP address or the MAC address of the terminal (4) is bond with corresponding purview; the gateway or the router refuses or forwards the message outside according to the binding address, and the source IP address or the source MAC address reaching to other data messages. The method utilizes, binds and combines a user authentication code and the IP/MAC address of the terminal message, can manage the use purview though the gateway or the router, and can not be required to limit the network user terminal environment and install any software and equipment on the terminal equipment, and only if the terminal is connected with the external network through the gateway or the router of the invention, and the identification, the authentication and the management to the network users can be realized by using protocols of an Http protocol, a Telnet protocol or a UPNP protocol, etc.; therefore the cost is lower, and the operation is convenient.

Description

technical field [0001] The invention relates to the security and use of computer network information, in particular to a network user authority authentication method. Background technique [0002] With the development of network technology, the number of network users has gradually increased, and the network has become an indispensable and important factor in people's life and work. In our homes and companies, there are various LANs, such as company networks and home networks. In these local area networks, how to distinguish different network users and assign corresponding permissions according to different network users has become an important content. For example, in a company network, it is hoped that different users such as bosses, administrators, and employees can be distinguished, and these users , Assign different permissions respectively, and for family users, can it distinguish between children, parents, guests and other users. [0003] For this problem, the indust...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/56H04L12/66
Inventor 缪伟
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products