User security access control method as well as device and system thereof

A security access and control method technology, applied in the user security access control method and device and system, in the field of network access, can solve the problem of failing to provide user security access control technology and the like

Inactive Publication Date: 2010-01-06
ZTE CORP
View PDF0 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] To sum up, the existing technology fails to provide a user security access control technology that is simple in operation process and does not depend on the client

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User security access control method as well as device and system thereof
  • User security access control method as well as device and system thereof
  • User security access control method as well as device and system thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The embodiment of the present invention provides a user security access control method in an 802.1X environment and its system and device, through Radius (Remote Authentication Dial in User Service, remote user dial-in authentication service) server and DHCP (Dynamic Host Configuration Protocol (Dynamic Host Configuration Protocol) server linkage, so that the DHCP server can assign the corresponding network IP address (unrestricted network IP address or restricted network IP address) to the user according to the user's IP address level, so that the user's network The access process is under security control. Embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0043] see figure 1 , is a schematic diagram of a network system architecture conforming to the 802.1X standard applicable to the embodiment of the present invention. In the network system architecture, entities related to the user access control ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user security access control method as well as a device and a system thereof, applied to a user network access process. The user security access control method comprises the following steps: a client of a user is authenticated by an authentication server and requests a DHCP server for obtaining an IP address; the DHCP server receives the request sent by the client for obtaining an IP address; the DHCP server obtains an IP address level corresponding to the client from the authentication server according to the request; the DHCP server assigns an IP address of a corresponding network to the client according to the obtained IP address level and sends the assigned IP address to the client. and the IP address level of the client is decided by a security level which is obtained by the client after security detection. The invention is applied to improve the security of the user access network while simplifying the control flows of the user access network and improving the reliability of the access control process.

Description

technical field [0001] The present invention relates to network access technology in the communication field, in particular to a user security access control method and its device and system. Background technique [0002] With the rapid development of broadband networks and the continuous increase in the number of users, hidden dangers of network security have become an increasingly prominent problem. While disseminating information, the network may also disseminate viruses, which is particularly obvious in enterprise networks or campus networks. If there is a problematic terminal in the network, and if there are no necessary protective measures in the network, the consequences will be unpredictable. [0003] How to effectively control the spread of network viruses is a common concern in the industry at present. Every network administrator hopes to have a way to limit the access of terminals with potential safety hazards (such as terminals infected with viruses or susceptib...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
Inventor 朱建勋曹彬辉
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products