Authentication processing method for broadband network

A broadband network and network terminal technology, applied in the field of network communication, can solve the problems of forced offline of network terminals, short-term abnormalities, and accurate detection of network terminals, etc., to reduce the potential cost of authentication processing, disperse processing load, reduce Effects of Potential Threats

Active Publication Date: 2005-07-20
HUAWEI TECH CO LTD
View PDF0 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0010] 2. After the network terminal passes the authentication and goes online normally, BNAS has abnormal phenomena such as restarting, and the status of each network terminal in BNAS is all lost, and BNAS does not send the accounting stop message of each network terminal in the lost state to the AAA server
[0011] 3. When the network terminal passes the authentication, goes online normally, and goes offline normally, the AAA server cannot receive the accounting stop message of the network terminal sent by the BNAS due to an abnormality in the network between the BNAS and the AAA server. After the network with the AAA server is restored, BNAS will not resend the accounting stop message of the network terminal
[0012] 4. When the network terminal passes the authentication, goes online normally, and goes offline normally, the AAA server cannot correctly process the billing stop message sent by the network terminal sent by the BNAS due to phenomena such as restarting the AAA server, abnormal database, etc. After the AAA server returns to normal, BNAS will not resend the accounting stop message of the network terminal, and the AAA server will not reprocess the accounting stop message of the network terminal
Using this method will also bring a new problem, when the network between BNAS and AAA server has a short-term abnormality, such as the loss of some intermediate accounting packets, but the network terminal, BNAS and AAA server are not abnormal In some cases, this method will cause the network terminal to be forced to go offline abnormally
[0026] To sum up, when the AAA server authenticates the network terminal, the detection method provided by the existing technology cannot timely and accurately detect whether the network terminal is hanged, resulting in poor reliability of the AAA authentication process, making normal The network terminals cannot access the Internet normally; and the AAA server concentrates on processing a large number of hanged network terminals, occupying a large amount of network resources in a short time, increasing the potential threat of network equipment and increasing the potential cost of network equipment authentication processing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication processing method for broadband network
  • Authentication processing method for broadband network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Since the network terminal is hacked, the network terminal will not be properly authenticated, so that the network terminal cannot be online, so the present invention increases the detection when authenticating the network terminal. Whether the network terminal is hailed, through which the detection process is determined, it is determined that the network terminal is hacked, and immediately resets it, the hanger is released, and then the network terminal is authenticated. Therefore, whether it is due to the authentication server, the network access device has caused the network terminal to be hanged, or because the network between the authentication server and the network access device causes the network terminal to be hanged, when the network terminal will apply for authentication again It can be detected in time, not affecting the authentication server for normal authentication, ensuring that the network terminal is always online. The hanger detection of the present inven...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention supplies a method to process identification in wide band network. Its core is that: recording the address data of the online network terminal; when receiving the identification request text from network terminal, capturing the address information of the terminal; comparing the information with the recorded information and record the terminal that matched the recorded address information; taking identification to the network terminal according to the identification request text of network terminal that matched with the address information. The invention improves the reliability of identification process, decreases the potential threat of the network device.

Description

Technical field [0001] The invention relates to the technical field of network communication, in particular to a method of authentication processing in a broadband network. Background technique [0002] With the development of broadband networks, it has become a popular phenomenon for network terminals to access broadband networks through broadband access services and access INTERNET through broadband networks. The schematic diagram of the network terminal accessing the broadband network through the broadband access service is as attached figure 1 Shown. [0003] in figure 1 Among them, BNAS (Broadband Network Access Server) is a broadband access control device located between the network terminal and the Internet, and the AAA (Authorization, Authentication, Accounting) server provides functions such as authorization, authentication, and accounting for the network terminal. The network terminal accesses the broadband network through broadband access methods such as xDSL (x digi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32
Inventor 郑志鹏
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products