Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identification and business management for network user

A network user and business management technology, applied in the field of network user authentication and business management, can solve problems such as restricting Ethernet access to broadband network expansion, and achieve the effects of reducing CPU burden, preventing user counterfeiting, and lowering requirements

Inactive Publication Date: 2004-07-07
HUAWEI TECH CO LTD
View PDF0 Cites 32 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In the Ethernet access environment, in order to realize the effective identification of users and prevent users from changing the Internet address (hereinafter referred to as IP address) and link layer address (hereinafter referred to as MAC address) at will, the access device uses VLAN ID to identify users, so as to Realize the management of end users, but because the VLAN ID ranges from 0 to 4095, 0 and 4095 have special meanings and are generally not used, so the actual available values ​​​​are only 1 to 4094, and they must be allocated to different services. Limits the expansion of Ethernet access to broadband networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification and business management for network user
  • Identification and business management for network user
  • Identification and business management for network user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] In the method for authentication and business management of network users proposed by the present invention, the networking structure of the network is the same as that of the prior art, such as figure 1 As shown, the timing diagram of this method is as follows figure 2 shown, see figure 2 , an embodiment of the present invention is introduced in detail.

[0031] First, the network topology of all access devices is established on the access server. The process of establishing the network topology includes: the access server and the access devices discover their neighbors through the Neighbor Discovery Protocol (Neighbor Discovery Protocol, hereinafter abbreviated as NDP); According to its own neighbor information, the server uses the Topology Discovery Protocol (TDP) to collect the neighbor information of the first-level access device; the first-level access device uses TDP to collect the neighbor information of the second-level access device , and so on, to get the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention relates to broadband access field, specially relates to a method by which can make certification to network users and carry out operational management, first build up the network analysis situs of access equipment on the access server, and register the capacity of access equipment; the access equipment sends the basic information of users to the access sever, the access server sends the certification information of users to AAA server, the AAA server confirms this certification of users has passed, sends the passing information and authorization message to the access equipment, after the access equipment receives the authorization message, completes stated action, implements the certification and operational management to users. This method can complete the control for multicast, broadband operation on the bottom layer access equipment.

Description

technical field [0001] The invention relates to the field of broadband access technology, in particular to a method for authenticating network users and managing services. Background technique [0002] The current user access system completes user authentication access and management on one device, but some services such as multicast services, refer to figure 1 , after user 1 joins multicast group A, the access server sends the multicast stream to the first-level access device 1, and the first-level access device 1 sends it all the way to the Nth-level access device 1 closest to the user; When user 4 wants to join the multicast group A, in order to ensure that only one copy of the multicast is sent between the access server and the first-level access device, the first-level access device 1 must know whether the user 4 joins the multicast group A through Only after obtaining the authentication of the access server can it be decided whether to forward the multicast stream to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L12/24H04L29/06
Inventor 姚析
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products