Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for realizing network access control

A network access control and network access technology, applied in the field of network access control, can solve the problems of unsuitable hotel environment, difficult for network operators to know when network end users start to surf the Internet, weak monitoring of network end users, etc. The process is convenient and fast, clear network access control, and the effect of network access control is realized

Inactive Publication Date: 2008-03-26
HUAWEI TECH CO LTD
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] With this method of accessing the Internet without authentication, network operators do not authenticate network terminal users because they are monthly or yearly subscriptions, so network operators are relatively weak in monitoring network terminal users Know when the network terminal user starts to surf the Internet, when to stop surfing the Internet and the traffic of the network terminal user during the period of surfing the Internet, etc.
Therefore, although this way of accessing the Internet does not need to authenticate the user name and password of the network terminal user, it is still not applicable to the above-mentioned hotel environment.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for realizing network access control
  • A method for realizing network access control
  • A method for realizing network access control

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] The core idea of ​​the present invention is: we can simplify the authentication process and adopt an Information such as user name information and passwords of network terminal users can also realize a convenient and fast authentication method for authentication to manage the Internet access rights and information of network terminal users, so as to realize network access control for network terminal users.

[0043] The specific implementation method of the present invention is: the network terminal user transmits the request message to the network access device, the network access device can be a switch, etc., and the request message can be an HTTP (Hypertext Transfer Protocol) request message, such as a network terminal The user clicks on the IE browser to apply to open a certain web page. After receiving the request message, the network access device determines the access location information of the network terminal user according to the information carried in the re...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention provides a method for realizing control of network access including: a network access device receives a request message transmitted from a network terminal to determine the access position information of the terminal according to the information carried in the message and authenticates said network terminal only according to the access position information of the terminal and controls network access to it, which authenticates a network terminal according to its access position information directly not according to the name of a user and ciphered codes and can get on-line information of network terminals, besides, it can generate related information of user names and ciphered codes automatically so management of network terminals becomes more flexible.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method for realizing network access control. Background technique [0002] With the rapid development of computers and computer communication networks, it has become an important part of people's work and life to use computers to surf the Internet and carry out information exchange in the network. [0003] Computer network terminal users can access the Internet through broadband, dial-up, etc. When network terminal users access the Internet, they can be authenticated and allowed to access the network after passing the authentication; they can also be directly allowed to access the network without authentication. [0004] The authentication of network terminal users is generally based on the user name information input by the network terminal user, such as user name and password. The user name can be used as the account information of the network terminal user to a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L12/56H04L12/24H04L29/02H04L29/06
Inventor 逄焕刚赵玉博颜杨周剑光
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products