Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

User service access processing method, access equipment and access terminal

A technology for access terminals and access devices, which is applied in transmission systems, electrical components, etc., and can solve problems such as the inability of processes to meet application requirements.

Inactive Publication Date: 2014-01-15
ZTE CORP
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] If the user does not initiate authentication or the authentication fails, the user may need to visit certain controlled sites to obtain relevant information or download relevant software for further operations, so as to obtain network authorization, such as online payment, etc., but now The process in the existing technology cannot meet the above application requirements

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User service access processing method, access equipment and access terminal
  • User service access processing method, access equipment and access terminal
  • User service access processing method, access equipment and access terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0036] The access terminal configures the information of the non-authenticated service channel on the user-side port, and configures the information of the authenticated service channel on the user-side port when the authentication is successful, and maintains the configuration on the user-side port when it is not authenticated or the authentication fails. .

Embodiment 2

[0038] The access terminal configures the information of the authentication service channel on the user side port. When the access terminal is not authenticated or the access authentication fails, the access device forwards the data received from the authentication service channel through the non-authentication service channel. Specifically, the access device modifies the channel identifier of the data received from the authentication service channel to the identifier of the non-authentication service channel; when accessing through the user-side port and the authentication is successful, keep the Configuration.

[0039] The service channel in this method is the logical channel of virtual local area network or passive optical network or the virtual channel (VC) of digital subscriber line (DSL), and the logical channel of passive optical network is the general encapsulation of gigabit passive optical network (GPON) Port (GEM) or Ethernet Passive Optical Network (EPON) Logical L...

specific Embodiment 1

[0052] The access device is configured with N-1 authenticated service channels VLAN2 to VLAN N+1 and one non-authenticated service channel VLAN 1. The access device notifies the configuration information of each channel to the service channel of the access terminal.

[0053] The access terminal configures the non-authentication service channel VLAN 1 to N user-side port 1 to user-side port N.

[0054]If the access terminal is not authenticated or the authentication fails during the access process, the access terminal maintains the non-authentication service channel VLAN 1 configured on user-side port 1 to user-side port N. The access device maintains the configuration of the original service channel, and performs user data access through the non-authenticated service channel VLAN 1.

[0055] If the access terminal is successfully authenticated during the access process, the access terminal deletes the non-authentication service channel VLAN 1 configured on user-side port 1 to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user service access processing method, a piece of access equipment and an access terminal. The access equipment is arranged to be connected to an authenticated service channel and a non-authenticated service channel of the access terminal. The access equipment carries out user data access through the authenticated service channel when access of the access terminal is successfully authenticated, and the access equipment carries out user data access through the non-authenticated service channel when access of the access terminal is not authenticated or fails to be authenticated. The scheme can be adopted to solve the problem of application inconvenience caused by the fact that a user cannot access some controlled websites when the user does not initiate authentication or fails to be authenticated.

Description

technical field [0001] The present invention relates to the field of wireless communication, in particular to a user service access processing method, access equipment, and an access terminal. Background technique [0002] As an access terminal, a home gateway device is a device that connects a home network to an access network. The home gateway device is connected to a user terminal device and can control network access of the user terminal. The network side of the home gateway device can be connected to an access node device, such as a digital subscriber line access device, a passive optical network optical line terminal, and an Ethernet aggregation device. [0003] Such as figure 1 As shown, the access terminal (such as a home gateway device) can complete the device authentication through the authentication protocol. The authentication protocol includes the IEEE 802.1x protocol. The home gateway acts as the authentication initiator, and the access device acts as the auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
Inventor 袁立权秦超
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products