Method and system for accessing network based on user identification authorization
A technology for user identity and authorized access, applied in user identity/authority verification, transmission systems, digital transmission systems, etc., can solve problems such as decreased utilization of network resources and waste of resources
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] In order to clearly illustrate the method and system of the present invention, a detailed description of preferred embodiments is given below.
[0041] The method of the invention includes a network access process and a process of authorizing access to network resources based on user identity. In order to illustrate the method clearly, the two processes are described separately.
[0042] see figure 1 , figure 1 It is a flow chart of the network access process in the embodiment of the inventive method. In the method of the present invention, a relay device adopting the Diameter protocol and a redirection device are introduced, the relay device realizes data relay sending and receiving, and the redirection device realizes data transmission. Route forwarding to each network.
[0043] The authentication process of network access in the method of the present invention includes two stages: the first stage occurs between the terminal user and the access network; the second ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 