Protection method of network authentication charging information
A technology for billing information and network authentication, applied in the field of network information protection, can solve problems such as failure of user billing information to be delivered, interruption of services, interruption of communication between network access equipment and servers, etc., to protect interests and improve reliability. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0018] Since the existing RADIUS server-based method for user authentication and accounting cannot guarantee the protection of user authentication or accounting information when the link that transmits authentication or accounting information fails, resulting in user authentication or accounting The loss of information prevents normal user authentication or billing operations. In fact, the purpose of authentication is to check whether the Internet user is a legitimate user. As long as there is a network node or device that stores user authentication information, the user can be authenticated, not a remote RADIUS server. Similarly, the user's accounting information does not necessarily have to be transmitted to the remote RADIUS server in real time. At least for services that do not require real-time accounting, the real-time transmission of accounting information is not required, but the user can be obtained when the user needs to be charged. Billing information.
[0019] Therefor...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 