Unlock instant, AI-driven research and patent intelligence for your innovation.

Secondary authentication access system and method thereof

An access system and secondary authentication technology, which is applied in the field of network communication, can solve the problems of slow access speed, limited mutual access quality and bandwidth, and increased operating costs for telecom users

Pending Publication Date: 2021-04-30
华北石油通信有限公司 +1
View PDF7 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The existing broadband access mode is to determine the user's exit line by assigning different types of IP addresses to the user. The reason for this is that there are problems restricting the quality and bandwidth of mutual access between different domestic ISPs, such as Telecom and Netcom. Among them, the speed of accessing Netcom by Telecom users is slow, and the corresponding speed of Netcom users accessing Telecom is also slow.
[0004] One of the methods to solve the above problem is: by uniformly assigning IP addresses of dynamic BGP (Border Gateway Protocol, Border Gateway Protocol) egress lines to users, all users will go out of the network through BGP egress lines uniformly, but due to the high price of BGP lines, with With the continuous increase of users and the improvement of bandwidth, the operating cost has also increased sharply
[0005] The second method to solve the above problem is to provide users with the IP address of the corresponding egress line according to the user's needs. The address belongs to the communication company. On the one hand, the DNS of the telecom operator cannot provide resolution services; on the other hand, the cooperation effect with the export line cannot be compared with the operator's own IP address

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secondary authentication access system and method thereof
  • Secondary authentication access system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] The present invention will be further described below in conjunction with drawings and embodiments. However, those skilled in the art should know that the present invention is not limited to the specific embodiments listed, as long as it conforms to the spirit of the present invention, it should be included in the protection scope of the present invention.

[0041] See attached figure 1 , 2The secondary authentication access system of the present invention includes a system main body, the system main body includes a first network connection, a second network connection and a Radius protocol module, and the first network connection includes an ISP1 network module, an ISP1 network, and a virtual dual-stack host system and the first IP protocol stack, the ISP1 network also includes a BNG control device and a cloud computing platform access management unit, and the second network connection includes a second IP protocol stack, a remote target host and a virtual dual-stack ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a secondary authentication access system and a method thereof. A system main body comprises a first network connection, a second network connection and a Radius protocol module, the first network connection comprises an ISP1 network module, an ISP1 network, a virtual dual-stack host system and a first IP protocol stack, and the ISP1 network further comprises a BNG control device and a cloud computing platform access management unit. The second network connection comprises a second IP protocol stack, a remote target host and a virtual dual-stack host system, and the remote target host further comprises an ISP2 network. The invention has the beneficial effects that on the basis that the authentication access and networking modes meet the basic requirements of users, both parties of cooperation have control rights to the users in the cooperation range, both parties of cooperation can carry out authentication authorization charging operation on the users, and meanwhile, the users can access internal resources of ISP1 and ISP2.

Description

technical field [0001] The invention relates to a broadband access method, in particular to a secondary authentication access system and method thereof, and belongs to the technical field of network communication. Background technique [0002] At present, as a member of CNNIC and a secondary regional ISP (Internet Service Provider, Internet Service Provider) that provides Internet access services, the communication company owns 3B Internet IP addresses. Due to the lack of its own Internet export resources, the use of IP address resources It needs to be completed jointly with telecom operators, and the quality of the Internet outlet represents the quality of the entire network. With the increasing number of users and changing user needs, it is necessary to provide corresponding network services according to user needs. Network resources are allocated reasonably. [0003] The existing broadband access mode is to determine the user's exit line by assigning different types of I...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12H04L12/46
CPCH04L63/08H04L63/0892H04L12/4633H04L12/4641H04L63/083H04L61/5007
Inventor 张献李克臣徐辉泽正刘立亚钟武军王军强刘鹏王甘霖谢小玲
Owner 华北石油通信有限公司