Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for identifying service block

A technology for business and grouping information, which is applied in the field of network communication, can solve problems such as complicated users, achieve the effect of simplifying authentication operations and improving user experience

Inactive Publication Date: 2009-11-25
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] On the other hand, as the Internet increasingly penetrates into people's daily life, users who often surf the Internet may customize a lot of services; for the purpose of business protection, CP will require users to authenticate each time they access their services ; It is very cumbersome for users to enter authentication information such as user name and password every time

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identifying service block
  • Method and system for identifying service block
  • Method and system for identifying service block

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] The present invention is described by taking the user switching multicast program as an example, see image 3 As shown, the group authentication method includes the following steps:

[0052] Step 301: The user saves program grouping information on the access device. The access device may be an edge router ER, a broadband remote access server BRAS or a digital subscriber line access multiplexer DSLAM, and this embodiment selects ER or BRAS.

[0053] Step 302: the user sends an access Join request message to the ER / BRAS.

[0054] Step 303: When the ER / BRAS receives the Join message sent by the user, it automatically judges whether the program accessed this time is in the user program group according to the locally saved information, and executes Step 304; otherwise, executes Step 309.

[0055] Step 304: Analyze the authentication status of the group. If the group is not authenticated, execute step 305, and if the group is authenticated, execute step 308.

[0056] Step...

Embodiment 2

[0078] The access device in this embodiment still uses the ER or BRAS as an example. The grouping methods of programs can be divided into two categories:

[0079]1) User-designated program grouping: users can bundle multiple multicast programs into one group according to their own preferences. These programs may come from the same CP, or may be provided by multiple CPs separately; The voice or SMS platform registers its own multicast channel grouping information with the AAA Server or network management system of the NSP; then the information is sent to ER / BRAS by the AAA Server or network management system, and ER / BRAS completes initialization after receiving the information operate. The group information may include group number, multicast service code, user identity information (optional) and other information. Take the user to register / cancel the grouping information with the network management system through the web page, and the network management system sends the grou...

Embodiment 3

[0093] see Figure 7 , a system for business group authentication, the system includes:

[0094] User equipment: Initiate a request to access services and provide user identity authentication information, which can be set-top boxes, PCs, and other equipment.

[0095] Access device: responsible as AAA Client (customer) and user agent, used to judge whether authentication is required according to the user's access service request, if necessary, initiate authentication operation, store user group information and authentication ID, and perform authentication based on group information Group authentication processing, after the authentication is passed, modify the authentication flag to pass the authentication.

[0096] Wherein, the above access device may be ER / BRAS / DSLAM.

[0097] Additionally, the system includes:

[0098] Web site: Optional, as an interface for users to set group information in the system, the Web site can be replaced by the voice or SMS service platform pro...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and system for business group authentication, belonging to the field of network communication. In order to solve the problem in the prior art that user authentication is cumbersome and affects service switching speed, the present invention provides a method for service group authentication, which includes saving user group information and authentication identifiers, sending user access service requests, receiving After receiving the user's request, check the authentication ID. If the authentication has passed, issue the service data and perform billing; otherwise, obtain the user's authentication information, request the content provider to authenticate, and issue the service after the authentication is passed data and perform billing, and at the same time set the authentication flag to pass authentication. The invention also provides a service group authentication system, including user equipment and access equipment. The invention minimizes the influence of service authentication on channel switching, improves user experience, simplifies user authentication operations, and reduces the possibility of user identity information being stolen.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a method and system for business group authentication. Background technique [0002] With the continuous development of the Internet, more and more data, voice and video information are exchanged in the network. In addition, emerging services such as e-commerce, online conferences, online auctions, video on demand, and distance learning are also gradually emerging. These services put forward requirements for information security, compensation, and network bandwidth. [0003] With the development of applications such as IPTV, VoD, and interactive games, how to better realize resource discovery and point-to-multipoint IP transmission has become the focus of modern network applications. As an effective IP transmission solution, multicast technology gradually shows its unique advantages in many aspects. [0004] IETF MBONED is a working group specializing in the deployment of l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32
Inventor 管红光
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products