Network access permission control method, device and related equipment
A technology for network access rights and control devices, which is applied in the field of network security and can solve problems such as inability to control users' network access rights
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0022] Such as figure 1 As shown, it is a schematic flow diagram of the network access authority control method in Embodiment 1 of the present invention, and its specific processing flow is as follows:
[0023] Step 11, when the user requests to access the network, the authentication server performs legality authentication on the user, and determines the user's network access right after the authentication is passed.
[0024] In Embodiment 1 of the present invention, when requesting to access the network, the user may first use the terminal device to initiate authentication to the authentication server, that is, send an authentication request to the authentication server. The authentication request should be sent to the network forwarding device, and then the network forwarding device sends the received authentication request to the authentication server.
[0025] The authentication request sent by the user carries the user's authentication information, where the user's authe...
Embodiment 2
[0055] Such as figure 2 As shown, it is a schematic diagram of the network architecture of the network access authority control method proposed in the second embodiment of the present invention. The terminal device 21 and the authentication server 22 cannot communicate directly, and need to forward the message through the network forwarding device 23 . When the user requests to access the network, the terminal device 21 can be used first to send the authentication request to the network forwarding device 23, and the network forwarding device 23 forwards the authentication request to the authentication server 22, and the authentication request carries the user's authentication information and The MAC address of the terminal device 21, the authentication server 22 extracts the user's authentication information from the received authentication request, and authenticates the legitimacy of the user's access to the network according to the extracted authentication information. When ...
Embodiment 3
[0058] Such as image 3 As shown, it is a schematic diagram of the specific implementation flow of the network access authority control method in Embodiment 3 of the present invention, and its specific processing flow is as follows:
[0059] Step 31, the user uses the terminal device to send an authentication request to the authentication server. In addition to carrying the MAC address of the terminal device, the authentication request also carries the user information (such as user name and password) of the user. The terminal device first sends the authentication request to switch, and the switch forwards the authentication request to the authentication server.
[0060] Step 32: The authentication server performs legality authentication on the user according to the user information (username and password) carried in the authentication request received, that is, judges whether the user is a legitimate user accessing the network.
[0061] In step 33, if the authentication resu...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 