Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and system for accessing network based on user identification authorization

A technology for user identity and authorized access, applied in user identity/authority verification, transmission systems, digital transmission systems, etc., can solve problems such as decreased utilization of network resources and waste of resources

Inactive Publication Date: 2011-10-26
BEIJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of this, the present invention is to provide a method and system for authorizing access to the network based on user identity, so as to solve the above-mentioned problems that if each user is assigned the same authority and resources, the utilization rate of network resources will decrease and resources will be wasted

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for accessing network based on user identification authorization
  • Method and system for accessing network based on user identification authorization
  • Method and system for accessing network based on user identification authorization

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to clearly illustrate the method and system of the present invention, a detailed description of preferred embodiments is given below.

[0041] The method of the invention includes a network access process and a process of authorizing access to network resources based on user identity. In order to illustrate the method clearly, the two processes are described separately.

[0042] see figure 1 , figure 1 It is a flow chart of the network access process in the embodiment of the inventive method. In the method of the present invention, a relay device adopting the Diameter protocol and a redirection device are introduced, the relay device realizes data relay sending and receiving, and the redirection device realizes data transmission. Route forwarding to each network.

[0043] The authentication process of network access in the method of the present invention includes two stages: the first stage occurs between the terminal user and the access network; the second ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method and a system for an authorized access network based on the user identity, wherein, the method comprises the following steps: the SLCC in user equipment generates a corresponding SAML document identity message according to the identity information input by a user and sends the message to PAA; the PAA encapsulates the message, converts PNNA signaling into Diameter signaling by the connected SLCC, and transmits the message to Diameter repeater equipment; the Diameter repeater equipment transmits the message to a corresponding network by Diameter redirect equipment; analysis is carried out to the message by an AAA server which receives the message, then URA authenticates the analyzed user identity and obtains the attributes and the role information of the userby APRRA; PDP obtains authorized decision-making information from the APRRA by the attributes and the role information, and EP sets user equipment access permission and allocates network resources according to the authorized decision-making information. The invention can reasonably set the user permission and allocate the network resources.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a method and system for authorizing access to a network based on user identity. Background technique [0002] In current network access technologies, two authentication mechanisms, IEEE802.1X and PPPOE, are commonly used. The point-to-point connection protocol (PPPOE) carried by Ethernet applies the PPP link protocol, and establishes a point-to-point PPP link channel between the user and the authentication server. It does not use the development of multicast services, and its access method requires Increase the encapsulation overhead of the frame, mainly applicable in the Ethernet range. [0003] In IEEE802.1X authentication, the user and the authenticator transmit authentication messages through the Extended Authentication Protocol over Local Area Network (EAPOL) carrying the Extensible Authentication Protocol (EAP). The state of the port controls user access. [0004]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/08H04L12/56H04L12/28
Inventor 宋梅马文静张勇满毅王佳佳张轩谷晨康祥清张欢宋俊德
Owner BEIJING UNIV OF POSTS & TELECOMM