Unlock instant, AI-driven research and patent intelligence for your innovation.

Network access permission control method, device and related equipment

A technology for network access rights and control devices, which is applied in the field of network security and can solve problems such as inability to control users' network access rights

Inactive Publication Date: 2012-07-18
BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
View PDF6 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Embodiments of the present invention provide a network access authority control method, device, and related equipment to solve the problem that in the prior art, when multiple users connected to the same forwarding port have different network access authority, the network access authority of the user cannot be realized control problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access permission control method, device and related equipment
  • Network access permission control method, device and related equipment
  • Network access permission control method, device and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] Such as figure 1 As shown, it is a schematic flow diagram of the network access authority control method in Embodiment 1 of the present invention, and its specific processing flow is as follows:

[0023] Step 11, when the user requests to access the network, the authentication server performs legality authentication on the user, and determines the user's network access right after the authentication is passed.

[0024] In Embodiment 1 of the present invention, when requesting to access the network, the user may first use the terminal device to initiate authentication to the authentication server, that is, send an authentication request to the authentication server. The authentication request should be sent to the network forwarding device, and then the network forwarding device sends the received authentication request to the authentication server.

[0025] The authentication request sent by the user carries the user's authentication information, where the user's authe...

Embodiment 2

[0055] Such as figure 2 As shown, it is a schematic diagram of the network architecture of the network access authority control method proposed in the second embodiment of the present invention. The terminal device 21 and the authentication server 22 cannot communicate directly, and need to forward the message through the network forwarding device 23 . When the user requests to access the network, the terminal device 21 can be used first to send the authentication request to the network forwarding device 23, and the network forwarding device 23 forwards the authentication request to the authentication server 22, and the authentication request carries the user's authentication information and The MAC address of the terminal device 21, the authentication server 22 extracts the user's authentication information from the received authentication request, and authenticates the legitimacy of the user's access to the network according to the extracted authentication information. When ...

Embodiment 3

[0058] Such as image 3 As shown, it is a schematic diagram of the specific implementation flow of the network access authority control method in Embodiment 3 of the present invention, and its specific processing flow is as follows:

[0059] Step 31, the user uses the terminal device to send an authentication request to the authentication server. In addition to carrying the MAC address of the terminal device, the authentication request also carries the user information (such as user name and password) of the user. The terminal device first sends the authentication request to switch, and the switch forwards the authentication request to the authentication server.

[0060] Step 32: The authentication server performs legality authentication on the user according to the user information (username and password) carried in the authentication request received, that is, judges whether the user is a legitimate user accessing the network.

[0061] In step 33, if the authentication resu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network access permission control method, device and related equipment. The network access permission control method comprises the following steps: an authentication server determines a network access permission of a user, enables a permission identifier of network access permission and a user identifier of a user determined to be carried out in an authorized message, and sends the authorized message to network forwarding equipment; the network forwarding equipment finds a local area network identifier corresponding to the permission identifier carried in the received authorized message in a corresponding relation between the permission identifier and the local area network identifier, and stores the user identifier and the local area network identifier correspondingly; the network forwarding equipment finds the local area network identifier corresponding to the user identifier in a corresponding relation between the user identifier and the local area network identifier, and transmits data messages of the user in a VLAN (Virtual Local Area Network) corresponding to the local area network identifier. By adoption of the technical scheme disclosed by the invention, the problem that the control for the network access permission of the user can not be realized in the prior art is solved.

Description

technical field [0001] The present invention relates to the technical field of network security, in particular to a network access authority control method, device and related equipment. Background technique [0002] Currently, the Internet provides users with a large number of network resources, some of which can only be accessed by users with corresponding network access rights, and different users usually have different network access rights, for example, some users can only access For a specific network within a LAN, some users can access all the networks within their local area network. [0003] In order to control the user's network access rights, the prior art usually presets a plurality of virtual local area networks (VLAN, Virtual Local Area Network), each VLAN corresponds to a network access right, and each network forwarding device (such as a switch) A forwarding port (such as a switch port in a switch) corresponds to a network access right, and the network admin...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/46H04L29/12
Inventor 林志鸿
Owner BEIJING XINWANG RUIJIE NETWORK TECH CO LTD