Method for realizing network access control

A network access control and network access technology, applied in the field of network access control, can solve the problems that it is difficult for network operators to know when network end users start to surf the Internet, the monitoring of network end users is weak, and the hotel environment is not suitable, etc. The process is convenient and fast, clear network access control, and the effect of network access control is realized

Inactive Publication Date: 2005-03-09
HUAWEI TECH CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] With this method of accessing the Internet without authentication, network operators do not authenticate network terminal users because they are monthly or yearly subscriptions, so network operators are relatively weak in monitoring network terminal users Know when the network terminal user starts to surf the Internet, when to stop surfing the Internet and the traffic of the network terminal user during the period of surfing the Internet, etc.
Therefore, although this way of accessing the Internet does not need to authenticate the user name and password of the network terminal user, it is still not applicable to the above-mentioned hotel environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing network access control
  • Method for realizing network access control
  • Method for realizing network access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The core idea of ​​the present invention is: we can simplify the authentication process and adopt an Information such as user name information and passwords of network terminal users can also realize a convenient and fast authentication method for authentication to manage the Internet access rights and information of network terminal users, so as to realize network access control for network terminal users.

[0043] The specific implementation method of the present invention is: the network terminal user transmits the request message to the network access device, the network access device can be a switch, etc., and the request message can be an HTTP (Hypertext Transfer Protocol) request message, such as a network terminal The user clicks on the IE browser to apply to open a certain web page. After receiving the request message, the network access device determines the access location information of the network terminal user according to the information carried in the re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides a method for realizing network access control including a network acc device receives a request message from a network terminal to determine the acc position information of the terminal based on the information loaded by the request message, the said network acc device certifies the network terminal based on its acc position information only and controls the terminal for network access in terms of the certification result.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method for realizing network access control. Background technique [0002] With the rapid development of computers and computer communication networks, it has become an important part of people's work and life to use computers to surf the Internet and carry out information exchange in the network. [0003] Computer network terminal users can access the Internet through broadband, dial-up, etc. When network terminal users access the Internet, they can be authenticated and allowed to access the network after passing the authentication; they can also be directly allowed to access the network without authentication. [0004] The authentication of network terminal users is generally based on the user name information input by the network terminal user, such as user name and password. The user name can be used as the account information of the network terminal user to a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L12/24H04L29/02H04L29/06
Inventor 逄焕刚赵玉博颜杨周剑光
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products