Method for performing AAA (Authentication, Authorization and Accounting) authentication during failure of database

A technology of faults and databases, applied in the field of communication, can solve problems such as inability to use, affect, and reduce user experience, and achieve the effects of easy popularization, simple operation steps, and improved user experience quality

Active Publication Date: 2014-01-22
BEIJING CAPITEK
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the connection fails due to a database failure, the AAA server cannot obtain information about the mobile user number MDN and user type according to the IMSI; when performing AAA authentication, WAP (Wireless Application Protocol) services cannot be obtained because there is no MDN use
In addition, the binding information also cannot be read from the database, causing the binding logic in AAA authentication to fail to take effect
Therefore, during the entire process from the occurrence and discovery of database failures to finding and solving problems, all user access requests will be rejected because they cannot connect to the database, making users unable to access data services. This consequence will seriously affect and reduce user Experience, while bringing unpredictable losses to telecom operators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for performing AAA (Authentication, Authorization and Accounting) authentication during failure of database
  • Method for performing AAA (Authentication, Authorization and Accounting) authentication during failure of database

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0020] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0021] The method for performing AAA authentication when the database fails in the present invention is a pseudo-authentication method, that is, reading public NAI information and VPN information from files, and then reading IMSI-related information and binding information from the memory object cache component, and the AAA server User authentication and authorization are performed based on this information. Because when the database is working normally, the AAA server has already written the information of the public network access identifier NAI and the virtual private network VPN into the extensible markup language xml file, and also regularly reads the user's International Mobile Subscriber Identity (IMSI) information and user binding information from the datab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for performing AAA (Authentication, Authorization and Accounting) authentication during failure of a database. Since an AAA server has written information on public NAI (Network Access Identifier) and VPN (Virtual Private Network) into an xml (Extensible Markup Language) file, also reads IMSI (International Mobile Subscriber Identity) information and user binding information of a user from the database periodically and stores in a memory object cache component so as to perform false authentication during failure of the database when the database works normally, the AAA server reads the NAI and the VPN information from the xml file and acquires the IMSI information and the user binding information from the memory object cache component by taking IMSI+ 'auth' as keyword for mobile directory number (MDN) authentication, binding check, roaming authority control and group authorization when the database fails and the connection of the AAA server and the database fails. The method can guarantee that the user can still normally access the data traffic during failure of the database, so that the service quality of the user experience is improved; the serious consequence that the economic benefit and the social benefit of a telecom operator are affected at the time in the prior art is avoided, so that both the user and the operator win.

Description

technical field [0001] The present invention relates to a method for performing AAA authentication when a database fails, and to be more precise, relates to a method for AAA server to perform authentication and authorization by means of file authentication when both the primary and backup databases of AAA fail. Or users configured in the memory object cache component perform authentication and accounting operations to ensure business continuity. It belongs to the technical field of communication. Background technique [0002] Authentication, Authorization and Accounting The AAA (Authentication, Authorization, Accounting) server is located in the packet core network and is responsible for the functions of user authentication, authorization and accounting; that is, to identify the identity and authority of users when using network services and accessing resources AAA authentication plays a very important role in the business of telecom operators. [0003] see figure 1 , to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04L12/24
Inventor 陈涛谭立彦李学春王菲
Owner BEIJING CAPITEK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products