Network access control method and device thereof

A network access control and network access technology, applied in the field of network access control methods and devices, can solve the problems of inability to control the user's online time, the deterioration of the monitoring effect of the user's online time, and the time limit for accessing the mobile Internet to achieve network access. Control effective and comprehensive, flexible effects

Active Publication Date: 2014-01-15
HUAWEI TECH CO LTD
View PDF5 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] On the one hand, because it is impossible to limit the online time of accessing the mobile Internet, it is impossible to control the online time of users using smart mobile terminals;
[0008] O

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access control method and device thereof
  • Network access control method and device thereof
  • Network access control method and device thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] This embodiment discloses a network access control method, which can be applied at the communication network end to control the user's network access, see figure 1 As shown, it mainly includes the following steps:

[0035] Step 101: the access gateway receives a network access request.

[0036] All users access the network through the access gateway and use network services.

[0037] Step 102: Obtain the user identification and network access information of the network access request currently received by the access gateway.

[0038] In this embodiment, the user ID uniquely identifies the user in the network, for example:

[0039] In the broadband network, the user's broadband account, or an identification composed of the user's broadband account and the user's login password may be used as the user's user identification in the network, but not limited to.

[0040] In the mobile communication network, the mobile phone number of the user may be used as the identificat...

Embodiment 2

[0080] As an implementation example of the technical solution of this implementation, the access control table set in the mobile communication network may be shown in Table 1 below.

[0081] Table 1: Network access control strategy for network controlled users in the mobile Internet

[0082]

[0083] Step 201: the access gateway receives a user network access request.

[0084] The downlink gateway interface of the access gateway receives the user's network access request. In this mobile communication network, the access gateway is a mobile communication access gateway.

[0085] Step 202: Obtain the user ID and network access information of the network access user.

[0086] The user ID is the user's mobile phone number, which is the unique identification of the user in the network.

[0087] The network access information includes at least the address of the destination website, the time spent online on the day, the time spent online on the destination website, and the lik...

Embodiment 3

[0114] As an implementation example of the technical solution of this implementation, the access control table set in the broadband may be shown in Table 2 below.

[0115] Table 2: Schematic representation of network access control policies for network controlled users in broadband Internet

[0116]

[0117]

[0118] Generally, each family shares a unique Internet account, so the control user can directly use the broadband account and password to log in to the operator's website, set and store the Internet access control strategy on the interface provided by the website. In order to prevent other family members from modifying the access control list, it is also possible to set the user ID of the control user in the access control list, so that when anyone makes changes to the access control list, the network will send a control notification to the control user. The information notification can be SMS, MMS, Wap push and so on.

[0119] The network access control method o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to communication field, and discloses a network access control method and a device thereof. The network access control method comprises the following steps: acquiring a user identity in a network access request that is received by an access gateway; inquiring a prestored access control table according to the user identity and determining whether the user is a controlled user; if the user is the controlled user, acquiring the network access information of the controlled user; inquiring the access control table according to the network access information, determining whether the network access request exceeds a network access allowed range of the controlled user; if the network access request exceeds the network access allowed range of the controlled user, inquiring the access control table for acquiring a processing strategy to the network access request; and determining a network access control instruction according to the processing strategy, and transmitting the network access control instruction to the access gateway so that the access gateway performs processing to the network access request according to the network access control instruction. The network access control method according to the technical solution of the invention causes controlling for network access of the user more comprehensive, more flexible and more effective.

Description

technical field [0001] The present invention relates to the communication field, in particular to a network access control method and device. Background technique [0002] With the development of mobile Internet technology and the popularization of smart phones, it is more and more common for teenagers to surf the Internet through mobile phones to conduct microblog, QQ chat, play mobile online games and other activities. Physical and mental health and learning life. [0003] At present, the methods for controlling the user's online time are all applied to computer terminals, and there is no method for controlling the online time based on the network level (including mobile Internet or wireless Internet, etc.). [0004] In the prior art, a method is to use anti-network addiction computer software, such as "Green Dam System", to control the user's online time on the computer by installing the software on the user's computer. It is to control the computer terminals connected ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
Inventor 曾水涛陈立峰
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products