Unlock instant, AI-driven research and patent intelligence for your innovation.

Protection method of network authentication charging information

A technology for billing information and network authentication, applied in the field of network information protection, can solve problems such as failure of user billing information to be delivered, interruption of services, interruption of communication between network access equipment and servers, etc., to protect interests and improve reliability. Effect

Inactive Publication Date: 2004-10-13
HUAWEI TECH CO LTD
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The defect of the above-mentioned method for authenticating and charging network users is that a single RADIUS server is adopted, so that the authentication and charging of network users are unreliable, which is embodied in the following two aspects:
[0003] 1. If the link between the access device and the RADIUS server fails or the RADIUS server itself fails, the communication between the network access device and the server is interrupted, and the users who have not been online cannot go online because they cannot pass the authentication of the RADIUS server
At this time, for users who are already online, their billing information cannot be sent to the RADIUS server, so after a period of time, the n

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection method of network authentication charging information
  • Protection method of network authentication charging information

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0018] Since the existing RADIUS server-based method for user authentication and accounting cannot guarantee the protection of user authentication or accounting information when the link that transmits authentication or accounting information fails, resulting in user authentication or accounting The loss of information prevents normal user authentication or billing operations. In fact, the purpose of authentication is to check whether the Internet user is a legitimate user. As long as there is a network node or device that stores user authentication information, the user can be authenticated, not a remote RADIUS server. Similarly, the user's accounting information does not necessarily have to be transmitted to the remote RADIUS server in real time. At least for services that do not require real-time accounting, the real-time transmission of accounting information is not required, but the user can be obtained when the user needs to be charged. Billing information.

[0019] Therefor...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a protection method for a kind of network certification charging information, the method adds the certification information of users locally, sets a list pool and a buffer queue for storing user charging list, when the uses carry on network access and or charging, if the network certification server can't be sued normally, then and transmits the certification report to local, compares with the stored user certification information, the charging report is stored in the list pool after the certification. When the charging process if finished, sends the stop information of user to the network charging server, if the server doesn't feedback correct response, stores the stop charging information into the buffer queue, and resends the stop information, when the times of resending exceeds the preset times, stop sending; by using above project, the reliability of certification charging information can be upgraded, and it can protects the benefit of user and business trader.

Description

technical field [0001] The invention relates to a method for protecting network information. Background technique [0002] With the development of broadband network technology, how to protect the interests of users without damaging the interests of operators has become more and more concerned by users and operators. fee to achieve. Therefore, in the field of broadband access, how to ensure the accuracy and reliability of network information, such as authentication and billing information, is a matter of great concern to both users and operators. At present, the usual method is to use the remote authentication dial-in user (RADIUS) protocol to authenticate and charge network users. statistics on billing information. The defect of the above-mentioned method for authenticating and charging network users is that a single RADIUS server is adopted, so that the authentication and charging of network users are unreliable, which is embodied in the following two aspects: [0003] ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/00H04L12/14
Inventor 逄焕刚周剑光赵玉博颜杨董江如
Owner HUAWEI TECH CO LTD