Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and system for controlling the user to visit the network at the specific area

A specific area and user-specific technology, applied in the field of user login authorization and authentication, can solve problems such as affecting learning, difficult to guarantee security, chaotic online management, etc., and achieve the effect of promoting learning, promoting network security, and strengthening login management

Inactive Publication Date: 2007-10-17
ZTE CORP
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the existing AAA system, user information authentication mainly focuses on user account numbers and passwords. This system will cause some problems. For example, some student users may browse the Internet for information that is not related to learning when they are in class in the school laboratory. , affecting learning; or some students use laptops to surf the Internet in the teaching building, which will affect the learning of other students. In addition, in some core areas that need to be kept secret, if users who do not have access to the Internet can access the Internet in these areas, they will be Confidential information may be obtained through network monitoring and other methods, causing hidden dangers in network security management
Therefore, the problem of the existing AAA system is that it cannot control the areas where users can access the Internet, resulting in confusion in Internet management and difficulty in ensuring security.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for controlling the user to visit the network at the specific area
  • Method and system for controlling the user to visit the network at the specific area
  • Method and system for controlling the user to visit the network at the specific area

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0024] The core idea of ​​the present invention is: the method is divided into a step of setting regional login authentication rules and a step of the server system performing regional login authentication on user login information according to the above-mentioned set rules, which are respectively referred to as preset steps and User login authentication steps by region.

[0025] Among them, the preset step includes: dividing the login domain, and recording the corresponding relationship between all the access servers in the login domain and the login domain. This relationship can be recorded as a unique attribute of the access server that can be distinguished from other access servers and the login The corresponding relationship between domains, and bind the user account with the login domain; each corresponding relationship set in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method and system for controlling the user accessing the network only at the specified area. The method includes: record the corresponding relationship between the access server and this logon domain, this relation is recorded as the unique attribute of access server and the corresponding relationship with logon domain, and binds the user account number with the logon domain; the user may send the logon authentication information with the user account number to the access server, which may add the unique attribute of this access server in the logon authentication information to generate the authentication information, then sends the authentication information to the service end system, which may take out the unique attribute of access server from the authentication information, if the service end system makes sure that the access server corresponding to the user account number logon domain has the access server taken out from the authentication information, then the sub-area logon authentication of the user may be passed. The invention may effectively prevent the accessing of unauthorized users at the specified area, strengthen the network logon management and enhance the network safety.

Description

technical field [0001] The invention relates to a method and a system for managing network authentication, authorization, and accounting (AAA, Authentication, Authorization, Accounting), in particular to a method and a system for user login authorization authentication. Background technique [0002] With the in-depth development of national informatization work, improving the informatization level of the education system has become the focus of current work. The construction of campus network is the key to the information construction of education system, especially the construction of campus network in colleges and universities. In the process of informatization construction, the campus network can promote teachers and students to improve the level of application of information technology as soon as possible. The campus network provides teachers with an advanced auxiliary teaching tool and a rich library of teaching resources. The campus network provides a large number of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L12/28G06F15/16
Inventor 周根华
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products