User identifying method and device for internet connection sharing

A user identification and legal technology, applied in the Internet field, can solve the problems of inability to accurately identify shared Internet users, poor identification accuracy and reliability, and achieve the effects of low cost, convenient network deployment, and high identification reliability.

Active Publication Date: 2010-09-22
BEIJING ZHIGU TECH SERVICE
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0027] Embodiments of the present invention provide a method, system, and device for identifying shared Internet users, which are used to

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identifying method and device for internet connection sharing
  • User identifying method and device for internet connection sharing
  • User identifying method and device for internet connection sharing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0076]Embodiment 1 of the present invention provides a method for identifying shared Internet users, the process of which is as follows Figure 9 As shown, the execution steps are as follows:

[0077] Step S101: the terminal sends a message to the network side device.

[0078] Generally, the terminal will send the message to the access switch directly connected to itself, and then the access switch will send the message to the aggregation switch.

[0079] Step S102: The network side device obtains the message transmitted by the terminal.

[0080] In this application, generally, the converging switch obtains the message transmitted by the terminal and analyzes it. Determine the TCP first session information corresponding to the terminal sending the message according to the address information, port information carried in the message, and the time when the message is received.

[0081] The foregoing first session information may specifically include: a source IP address, a de...

Embodiment 2

[0098] Embodiment 2 of the present invention provides a Figure 8 The system shown realizes the method for identifying shared Internet users, and its process is as follows Figure 10 As shown, the execution steps are as follows:

[0099] Step S201: the terminal 22 sends an authentication request to the authentication server 31.

[0100] The terminal 22 may be a personal computer (PC), or may be a mobile terminal or the like. The legitimate user sends authentication information such as an authentication request to the authentication server 31 through the authentication client installed on the terminal 22 .

[0101] Step S202: the authentication server 31 authenticates the terminal 22 sending the request.

[0102] After passing the authentication, the authentication server will notify the detection server that the terminal 22 has passed the authentication. After passing the authentication, the message sent by the terminal 22 can be smoothly transmitted in the network.

[01...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a user identifying method for internet connection sharing as well as a system and device thereof. The method comprises following steps of: acquiring first session information of transmission control protocol corresponding to the terminal by network side equipment according to a message transmitted by a terminal; then matching the first session information with the second session information of transmission control protocol with TCP connection that reported by a certified validated terminal; if the second session information matching with the first session information does exist, confirming that the terminal sending the message is a certified validated terminal; and otherwise, confirming that the terminal sending the message is an invalid terminal. The method can identify invalid users of internet connection sharing effectively with high accuracy and reliability.

Description

technical field [0001] The invention relates to the technical field of the Internet, in particular to a method and device for identifying shared Internet users in network communication. Background technique [0002] In an ordinary LAN, as long as it can be connected to a network device, the network can be used directly without authentication and authorization, which is not conducive to the real-time monitoring of the network by the network administrator, and also causes people to worry about network security. Network authentication, which is used to authenticate the legitimacy of network or device access, has become an effective means of network security management and improves network security. [0003] Existing network authentication basically adopts a port-based network access control method to provide point-to-point secure access authentication for local area network (Local Area Network, LAN) users. figure 1 It is a simple example diagram of a personal computer network ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L12/28H04L29/06H04L9/32
Inventor 王龙顺
Owner BEIJING ZHIGU TECH SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products