Method for realizing user authentication of wide-band network special bus

A user authentication and broadband network technology, applied in the field of user authentication in broadband networks, can solve problems such as general limitations, inability to use authentication servers, increase costs, etc., and achieve the effect of simple Internet access, increased versatility and scalability

Inactive Publication Date: 2011-06-08
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this method is that it lacks the authentication and management of dedicated line users, and it cannot perform statistics and billing based on actual traffic.
[0006] However, this prior art has some deficiencies: a separate private protocol needs to be developed between the broadband access server and the authentication server, and the private protocol is used to transmit user attributes and perform user authentication according to the attributes, resulting in its The versatility is limited, so it cannot be applied to third-party authentication servers, which is not conducive to expansion; and will lead to additional cost

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing user authentication of wide-band network special bus
  • Method for realizing user authentication of wide-band network special bus
  • Method for realizing user authentication of wide-band network special bus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] see figure 1 , the method for realizing broadband network dedicated line user authentication in the present invention is applied to a broadband access system, and the system includes an authentication server 110 , a broadband access server 120 , a switch 130 and a user terminal 140 .

[0029] Wherein, the authentication server 110 provides functions such as authentication, authorization, and accounting for leased line users, and is also called Remote Authentication Dial-In User Service (RADIUS, Remote Authentication Dial-In User Service). It includes a user authentication management module, which is used to limit the legal use of the network by leased line users, and is combined with a broadband access server to achieve one-to-one correspondence between leased line users, IP addresses and time periods; a user account management module, which is used to identify users Effective management of accounts; billing module, used for billing dedicated line users; database, used ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention at least comprises wide band access server with port of private line for individual line subscriber and wide band access system of authentication server. The port of private line is configured into fast authentication mode to build strategy for generating account. The wide band access server generates authentication account according to strategy for generating account, and sends outthe request of authentication to authentication server. The authentication server analyzes the authentication request, and authenticates the account to determine if login of the individual line subscriber is permitted, and then returns the result.

Description

technical field [0001] The invention relates to broadband network technology, in particular to a method for authenticating users in the broadband network. Background technique [0002] With the development of information technology, more and more attention has been paid to broadband networks featuring high bandwidth, wide coverage and various access methods, and more and more users have been attracted. [0003] At present, broadband network users can be divided into two categories: dial-up users and leased line users. The so-called leased line users refer to users who access the broadband network through a Layer 2 leased line port. Generally speaking, a layer-2 leased line port includes an Ethernet port, a permanent virtual private line (PVC, Pernament Virtual Circuit) or a virtual local area network (VLAN, Virtual Local Area Network) to access a physical port or a logical port of a layer-2 leased line user; Ethernet ports include GE (Gigabit Ethernet) optical ports, FE (F...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 龚敏聪
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products