Disposal authentication method for network access and service application oriented to user

A technology for user authentication and network access. It is applied to electrical components, transmission systems, and data exchange through path configuration. It can solve problems such as service management platform performance impact and user feeling slow, and achieve easy implementation, small changes, and high efficiency. high effect

Active Publication Date: 2009-04-01
CHINA TELECOM CORP LTD
View PDF0 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] In this way, since the business management platform needs to query AAA in real time during business use, when the number of users reaches a certain scal

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Disposal authentication method for network access and service application oriented to user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The present invention will be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments of the invention are illustrated.

[0023] The one-time authentication method for user-oriented network access and service use provided by the present invention mainly includes: after the user terminal passes the first authentication, the access portal sends the user authentication information to the user terminal and the service portal for storage respectively ; When the user terminal accesses the service portal, the service portal obtains the user authentication information saved by the user terminal, compares it with the user authentication information stored locally, and performs legality authentication and authentication at the business level.

[0024] see figure 1 As shown, the present invention proposes a business process of a preferred embodiment of a method for one-time authentication of user-oriented WLAN access and service...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a one-step authentication method which faces to the network access and service usage of the user, which mainly comprises the steps as follows: after the user terminal passes the first authentication, an access portal sends the user authentication information to a user terminal and a service portal to be memorized respectively; when the user terminal visits the service portal, the service portal gains the user authentication information memorized by the user terminal and carries out the legality authentication and service authentication compared with the user authentication information memorized in local, thus needing no query for each service and having higher efficiency; one-step authentication facing to the user can be achieved quickly, the change to the network is small and the execution on the network is convenient.

Description

technical field [0001] The invention relates to the technical field of wireless broadband services, in particular to a user-oriented one-time authentication method for network access and service use. Background technique [0002] One-time user authentication means that the user can use various services after only one authentication, and the network can perform multiple authentications by itself without requiring the user to participate in multiple authentications. In order to meet this requirement, it is necessary to realize the association between the access layer and the service layer. [0003] The current solution to this problem is that when the user selects charging information, the service platform queries the access database for user account information according to the user's Internet Protocol (IP) address, and performs authentication and billing. In this way, after the user is authenticated by the authentication, authorization, and accounting (AAA) server at the ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/28H04L29/06
Inventor 邢燕霞于建港魏文娟潘卫杨恒石涛谢亮
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products