Method and system for identifying service block

A technology for business and grouping information, applied in the field of network communication, can solve the problems of cumbersome users, achieve the effect of simplifying the authentication operation and improving the user experience

Inactive Publication Date: 2007-04-11
HUAWEI TECH CO LTD
View PDF0 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] On the other hand, as the Internet increasingly penetrates into people's daily life, users who often surf the Internet may customize a lot of services; for the purpose of business protec

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for identifying service block
  • Method and system for identifying service block
  • Method and system for identifying service block

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0051] The present invention is illustrated by taking the user switching multicast program as an example, as shown in Figure 3, the group authentication method includes the following steps:

[0052] Step 301: The user saves program grouping information on the access device. The access device may be an edge router ER, a broadband remote access server BRAS or a digital subscriber line access multiplexer DSLAM, and this embodiment selects ER or BRAS.

[0053] Step 302: the user sends an access Join request message to the ER / BRAS.

[0054] Step 303: When the ER / BRAS receives the Join message sent by the user, it automatically judges whether the program accessed this time is in the user program group according to the locally saved information, and executes Step 304; otherwise, executes Step 309.

[0055] Step 304: Analyze the authentication status of the group. If the group is not authenticated, execute step 305, and if the group is authenticated, execute step 308.

[0056] Step...

Embodiment 2

[0080] The access device in this embodiment still uses the ER or BRAS as an example. The grouping methods of programs can be divided into two categories:

[0081] 1) User-designated program grouping: users can bundle multiple multicast programs into one group according to their own preferences. These programs may come from the same CP, or may be provided by multiple CPs separately; The voice or SMS platform registers its own multicast channel grouping information with the AAA Server or network management system of the NSP; then the information is sent to ER / BRAS by the AAA Server or network management system, and ER / BRAS completes initialization after receiving the information operate. The group information may include group number, multicast service code, user identity information (optional) and other information. Taking the user to register / cancel the grouping information with the network management system through the web page, and the network management system sending the...

Embodiment 3

[0095] Referring to Figure 7, a system for business group authentication, the system includes:

[0096] User equipment: Initiate a request to access services and provide user identity authentication information, which can be set-top boxes, PCs, and other equipment.

[0097] Access device: responsible as AAA Client (customer) and user agent, used to judge whether authentication is required according to the user's access service request, if necessary, initiate authentication operation, store user group information and authentication ID, and perform authentication based on group information Group authentication processing, after the authentication is passed, modify the authentication flag to pass the authentication.

[0098] Wherein, the above access device may be ER / BRAS / DSLAM.

[0099] Additionally, the system includes:

[0100] Web site: Optional, as an interface for users to set group information in the system, the Web site can be replaced by the voice or SMS service platfo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention provides a method and a system for service packet authentication including storing packet information and authentication labels of users, who send access service requests and the authentication labels are checked after the requests are received, if they have passed the authentication, the service data are sent down and charged, otherwise, the authentication information of the user is got to ask a content provider to authenticate it, then said service data are sent down and charged and the label is set to be authenticated. This invention also provides a system for service packet authentication including UE and access devices.

Description

technical field [0001] The invention relates to the field of network communication, in particular to a method and system for business group authentication. Background technique [0002] With the continuous development of the Internet, more and more data, voice and video information are exchanged in the network. In addition, emerging services such as e-commerce, online conferences, online auctions, video on demand, and distance learning are also gradually emerging. These services put forward requirements for information security, compensation, and network bandwidth. [0003] With the development of applications such as IPTV, VoD, and interactive games, how to better realize resource discovery and point-to-multipoint IP transmission has become the focus of modern network applications. As an effective IP transmission solution, multicast technology gradually shows its unique advantages in many aspects. [0004] IETF MBONED is a working group specializing in the deployment of l...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 管红光
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products