Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network access control method and device

A network access control and network access technology, which is applied in the field of network access control methods and devices, can solve the problems of poor monitoring of user Internet access time, inability to control user Internet access time, and access to mobile Internet access time restrictions, etc., and achieve flexible control. , Effective and comprehensive effect of network access control

Active Publication Date: 2017-08-18
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] On the one hand, because it is impossible to limit the online time of accessing the mobile Internet, it is impossible to control the online time of users using smart mobile terminals;
[0008] On the other hand, when the network is disabled, users are likely to continue to surf the Internet by changing terminal devices, accounts, etc., resulting in poor monitoring of the user's online time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access control method and device
  • Network access control method and device
  • Network access control method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] This embodiment discloses a network access control method, which can be applied at the communication network end to control the user's network access, see figure 1 As shown, it mainly includes the following steps:

[0035] Step 101: the access gateway receives a network access request.

[0036] All users access the network through the access gateway and use network services.

[0037] Step 102: Obtain the user identification and network access information of the network access request currently received by the access gateway.

[0038] In this embodiment, the user ID uniquely identifies the user in the network, for example:

[0039] In the broadband network, the user's broadband account, or an identification composed of the user's broadband account and the user's login password may be used as the user's user identification in the network, but not limited to.

[0040] In the mobile communication network, the mobile phone number of the user may be used as the identificat...

Embodiment 2

[0080] As an implementation example of the technical solution of this implementation, the access control table set in the mobile communication network may be shown in Table 1 below.

[0081] Table 1: Network access control strategy for network controlled users in the mobile Internet

[0082]

[0083] Step 201: the access gateway receives a user network access request.

[0084] The downlink gateway interface of the access gateway receives the user's network access request. In this mobile communication network, the access gateway is a mobile communication access gateway.

[0085] Step 202: Obtain the user ID and network access information of the network access user.

[0086] The user ID is the user's mobile phone number, which is the unique identification of the user in the network.

[0087] The network access information includes at least the address of the destination website, the time spent online on the day, the time spent online on the destination website, and the lik...

Embodiment 3

[0114] As an implementation example of the technical solution of this implementation, the access control table set in the broadband may be shown in Table 2 below.

[0115] Table 2: Schematic representation of network access control policies for network controlled users in broadband Internet

[0116]

[0117]

[0118] Generally, each family shares a unique Internet account, so the control user can directly use the broadband account and password to log in to the operator's website, set and store the Internet access control strategy on the interface provided by the website. In order to prevent other family members from modifying the access control list, it is also possible to set the user ID of the control user in the access control list, so that when anyone makes changes to the access control list, the network will send a control notification to the control user. The information notification can be SMS, MMS, Wap push and so on.

[0119] The network access control method o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to the communication field, and discloses a network access control method and device. The method includes: acquiring a user ID in a network access request received by an access gateway; querying a pre-stored access control table according to the user ID, and determining whether the user is controlled user; if the user is a controlled user, obtain the network access information of the controlled user; query the access control table according to the network access information, and determine whether the network access request exceeds the allowed range of the controlled user's network access; if it exceeds the controlled user's network access allowed range, query the access control table to obtain the processing policy for the network access request; determine the network access control command according to the processing policy, and send the network access control command to the access gateway, so that the access gateway executes the network access control command according to the network access control command Handling of network access requests. Applying the technical solution to the user's network access control is more comprehensive, flexible and effective.

Description

technical field [0001] The present invention relates to the communication field, in particular to a network access control method and device. Background technique [0002] With the development of mobile Internet technology and the popularization of smart phones, it is more and more common for teenagers to surf the Internet through mobile phones to conduct microblog, QQ chat, play mobile online games and other activities. Physical and mental health and learning life. [0003] At present, the methods for controlling the user's online time are all applied to computer terminals, and there is no method for controlling the online time based on the network level (including mobile Internet or wireless Internet, etc.). [0004] In the prior art, a method is to use anti-network addiction computer software, such as "Green Dam System", to control the user's online time on the computer by installing the software on the user's computer. It is to control the computer terminals connected ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 曾水涛陈立峰
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products