Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Broadband access method, terminal, server and system for performing secondary authentication

An authentication server and secondary authentication technology, which is applied in the field of user authentication, can solve the problems of complicated passwords, laborious passwords, and increased expenditures of network service providers.

Active Publication Date: 2016-07-20
CHINA TELECOM CORP LTD
View PDF5 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In actual use, considering the need to protect the security of user accounts, the passwords provided by network service providers to users when users open broadband accounts are often complex and difficult to remember, and users need to reconfigure dial-up accounts when they need to replace dial-up terminals such as routers. When using a broadband password, it is usually difficult to find a paper business form with a broadband password printed when opening a broadband account, which causes inconvenience to users when using broadband
At the same time, since there is a one-time configuration process of broadband account and password when opening an account and installing broadband, the network service provider needs to send a special person to the user's home to install and set up broadband, which is time-consuming and laborious, and also increases the burden on the network service provider. Expenses, while also causing inconvenience to users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Broadband access method, terminal, server and system for performing secondary authentication
  • Broadband access method, terminal, server and system for performing secondary authentication
  • Broadband access method, terminal, server and system for performing secondary authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Various exemplary embodiments of the present invention will now be described in detail with reference to the accompanying drawings. It should be noted that the relative arrangements of components and steps, numerical expressions and numerical values ​​set forth in these embodiments do not limit the scope of the present invention unless specifically stated otherwise.

[0052] At the same time, it should be understood that, for the convenience of description, the sizes of the various parts shown in the drawings are not drawn according to the actual proportional relationship.

[0053]The following description of at least one exemplary embodiment is merely illustrative in nature and in no way taken as limiting the invention, its application or uses.

[0054] Techniques, methods and devices known to those of ordinary skill in the relevant art may not be discussed in detail, but where appropriate, such techniques, methods and devices should be considered part of the Authorize...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a broadband access method, terminal, server and system for performing secondary authentication. The broadband access method for performing the secondary authentication comprises the steps: an authentication server performs first authentication according to preset account and passwords of a terminal; if the first authentication succeeds, configuration information is transmitted to a broadband remote access server (BRAS), at which the terminal is located; the BRAS allocates an IP address to the terminal and transmits the configuration information, and the terminal accesses a network; broadband line information of the terminal matches real account and passwords of a user, and the real account and passwords are encrypted by keys and then are transmitted to the terminal, and secondary authentication is performed; the terminal re-dials according to the real account and passwords, and after an authentication server passes the secondary authentication, normal broadband access is performed. According to the broadband access method, terminal, server and system for performing the secondary authentication, the original mode of configuring broadband account and passwords by the user is changed to be a mode of automatic configuration on a network side; therefore, configuration operations are simplified, and the security is improved.

Description

technical field [0001] The invention belongs to the user authentication technology in the field of computer and data communication, and in particular relates to a broadband access method, a terminal, a server and a system for secondary authentication using broadband line information. Background technique [0002] The broadband Internet access method currently provided by the network service provider is mainly the asymmetric digital loop (ADSL) method, and the access technology uses the Ethernet-based PPP (PPPoE) authentication method as its main authentication method. The PPPoE authentication method is that the user terminal submits a pair of account / password or challenge value to the authentication, authentication and accounting server (AAA) on the network side through the Password Authentication Protocol (PAP) or the Challenge Handshake Authentication Protocol (CHAP) when dialing up, and passes the network After the user side authenticates the account / password, the user au...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 王磊卢燕青杨敏维何双旺何峣陈淑珍
Owner CHINA TELECOM CORP LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products