Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access point and method for controlling access point

A technology for controlling access points and communication terminals. It is applied in user identity/authority verification, data exchange through path configuration, security devices, etc., and can solve problems such as increasing the cost of wireless access points and heavy burdens on client terminals.

Inactive Publication Date: 2005-09-21
CANON KK
View PDF0 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This adds to the cost of a wireless access point with filtering
In addition, setting operations for wireless links between wireless communication units that provide service levels correctly are also required, thus imposing a heavy burden on users of client terminals

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access point and method for controlling access point
  • Access point and method for controlling access point
  • Access point and method for controlling access point

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0040] According to a first embodiment of the present invention, an access point with a filtering function is used in a network including a local area network and a backbone network. In the local area network, IEEE 802.11 wireless LAN and Bluetooth (Bluetooth) network are used as communication media of the wireless local area network.

[0041] The operation of the access point is explained below.

[0042] FIG. 1 is a schematic diagram of a network configuration according to this embodiment. As shown in Figure 1, the network configuration includes: a backbone network 1, a wired LAN 2, a wireless LAN 3, a wireless access point 10 with a filtering function according to this embodiment, a LAN data server 11, and a proxy (proxy) used by the LAN. Functional remote authentication dial-in user service (Remote Authentication Dial-In User Server, RADIUS) server 12, backbone network data server 13, backbone network RADIUS server 14, wired client terminal 100 and wireless client terminal...

no. 2 example

[0061] Fig. 11 shows a schematic diagram of a network configuration according to the second embodiment.

[0062] As shown in Figure 11, the network configuration includes: backbone network 1101, wired LAN 1102, wireless LAN 1103, wireless access point 1110 with filtering function according to this embodiment, LAN data server 1111, RADIUS server with proxy function on the backbone network 1114 (i.e., such as an authentication server of an xDSL provider), backbone network data server 1113, backbone network RADIUS servers 1115 to 111n (i.e., such as user authentication servers of an Internet Service Provider (ISP), wired client terminal 11100, and wireless Client Terminal 11101 to Wireless Client Terminal 11103.

[0063] FIG. 12 is a schematic diagram showing functional layers of a wireless access point 1110 with a filtering function according to this embodiment. In order to realize the function according to this embodiment, the IP packet sniffing function block monitors the aut...

no. 3 example

[0068] Fig. 15 shows a schematic diagram of a network configuration according to the third embodiment. As shown in Figure 15, the network configuration includes: backbone network 1501, wired local area network 1502, wireless local area network-1 1503, wireless local area network-2 1504, wireless access point 1510 with filtering function according to this embodiment, local area network data server 1511, Backbone RADIUS Server-1 1514 (i.e., such as an authentication server of an xDSL provider), Backbone Data Server 1513, Backbone RADIUS Server-2 1515 to RADIUS Server-N 151n (i.e., such as an ISP's User Authentication Server), Wireless Access Point 1520 with IEEE 802.1x EAP function, Wired Client Terminal 15100, Wireless Client Terminal-A 15101, Wireless Client Terminal-B 15102, Wireless Client Terminal-C 15103, Wireless Client Terminal-α15201, and Wireless Client Terminal-β15202.

[0069] In this embodiment, the functional layer of the wireless access point with filtering funct...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

A wireless access point having a simple configuration provides a network service in accordance with a user level without placing a heavy burden on a user of a client station. The wireless access point controls connections among networks composed of a local network and a backbone network. The local network includes a wireless local network using a wireless communication medium. When establishing a communication association with a wireless station in the wireless local network, the wireless access point monitors a message in a user authentication sequence between the wireless station and an authentication server on a local network so as to acquire the authentication result and predetermined information associated with a login user, and determines a level of the login user. The wireless access point then sets up its own filtering function based on the determination.

Description

technical field [0001] The present invention relates to an access point for controlling connections between multiple networks and a method thereof. Background technique [0002] Recently, due to the widespread use of a wireless network system such as a wireless local area network (wireless LAN), a wireless network is used as a LAN, and there are wireless access point products with a filtering function for controlling connection with a backbone network. [0003] In addition, in order to ensure the security of network access, an extended authentication protocol (extended authentication protocol, EAP) is introduced to authenticate users. If the user's wireless station (station) is authenticated successfully, the wireless station is only authorized to connect to the network. [0004] In order to realize the seamless connection between the local network and the visited network on the IP (Internet Protocol, Internet Protocol) network, a method has been proposed, in which authenti...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/28H04L9/32H04M3/16
CPCH04W12/08H04L63/0236H04L63/102H04W12/06H04W88/08H04W12/50
Inventor 浜田正志
Owner CANON KK
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More