Method and device for preventing re-authentication of roaming user

A roaming user and re-authentication technology, applied in security devices, data exchange through path configuration, network data management, etc., can solve the problems of re-authentication, inability to implement differentiated control strategies for different access points, inaccuracy, etc. To achieve the effect of avoiding re-authentication

Inactive Publication Date: 2011-05-25
NEW H3C TECH CO LTD
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The following issues are prone to occur when WLAN users are roaming: When wireless users move from one access point (AP) to another AP, it may cause re-authentication at the BRAS
[0008] The existing technical solution shields the user's location c

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for preventing re-authentication of roaming user
  • Method and device for preventing re-authentication of roaming user
  • Method and device for preventing re-authentication of roaming user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to make the object, technical solution and advantages of the present invention clearer, the solutions of the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0037] The main idea of ​​the present invention is to report roaming user information to BRAS equipment through AC, realize update of user terminal information on BRAS authentication equipment and AAA Sever, and avoid re-authentication of WLAN roaming users at BRAS.

[0038] see figure 2 , figure 2 It is a flow chart of the method for preventing re-authentication of roaming users in the present invention. The specific steps are:

[0039] In step 201, the roaming user terminal performs WLAN association and requests access.

[0040] In step 202, the AC detects whether the VLAN of the roaming user terminal changes, and if so, executes step 203, otherwise executes step 209.

[0041] After the AC receives the access request from the ro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for preventing re-authentication of a roaming user. The method comprises the following steps of: when the virtual local area network (VLAN) of a roaming user terminal is changed, reporting roaming user terminal information to a broadband remote access server (BRAS) through an automatic controller (AC) to realize update of the roaming user terminal information on the BRAS and an authentication, authorization and accounting server (AAA server), and allowing the user to directly access the network by using the internet protocol (IP) of the changed VLAN. Based on the method, the invention also provides the device for preventing re-authentication of the roaming user. Under the condition that the authenticity of the access point of the user terminal is kept, the re-authentication of the roaming user terminal of the changed VLAN is avoided.

Description

technical field [0001] The invention relates to the field of wireless communication, in particular to a method and device for preventing re-authentication of roaming users. Background technique [0002] Wireless Local Area Network (WLAN) technology is one of the hot technologies in the communication field today, especially with the popularization of Wi-Fi terminals, the coverage of WLAN network is getting wider and wider. [0003] The centralized WLAN architecture consists of a wireless controller (AC) and a thin wireless access point (Fit AP). The AC performs centralized control and management of the wireless network, and the Fit AP completes the receiving and sending of wireless packets. AC uses Fit AP as the boundary combined with a fast RF management system, which greatly reduces the association time between wireless clients and APs, and can realize fast switching of wireless adapters such as handheld computers, handheld terminals, and notebook computers in the wireless...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W8/06H04W8/12
CPCH04L12/4641H04L63/0815H04L12/2856H04W8/02H04L12/4675H04W12/06
Inventor 常向青史扬刘建锋张海涛郑涛姚民
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products