Secondary authentication access system and method thereof
An access system and secondary authentication technology, which is applied in the field of network communication, can solve the problems of slow access speed, limited mutual access quality and bandwidth, and increased operating costs for telecom users
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0040] The present invention will be further described below in conjunction with drawings and embodiments. However, those skilled in the art should know that the present invention is not limited to the specific embodiments listed, as long as it conforms to the spirit of the present invention, it should be included in the protection scope of the present invention.
[0041] See attached figure 1 , 2The secondary authentication access system of the present invention includes a system main body, the system main body includes a first network connection, a second network connection and a Radius protocol module, and the first network connection includes an ISP1 network module, an ISP1 network, and a virtual dual-stack host system and the first IP protocol stack, the ISP1 network also includes a BNG control device and a cloud computing platform access management unit, and the second network connection includes a second IP protocol stack, a remote target host and a virtual dual-stack ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

