Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

177 results about "Authentication authorization accounting" patented technology

Authentication, authorization, and accounting (AAA) Authentication, authorization, and accounting (AAA) is a term for a framework for intelligently controlling access to computer resources, enforcing policies, auditing usage, and providing the information necessary to bill for services.

Certificate based authentication authorization accounting scheme for loose coupling interworking

A method of Authentication Authorization and Accounting (AAA) in an interworking between first and second networks that do not belong in the same asministrative domain, using certificate based transactions. In the method according to the invention, the second network sends a public key to the first network, and a certificate to a mobile device. The certificate includes information regarding the subscription level of the mobile device and is signed with a private key of the second network. Upon detection of the first network the mobile device transmits the certificate and the first network authenticates the certificate using the public and private keys of the second network, and authorizes access to the network in response. The first network then sends a session key encrypted with a public key of the mobile device. The mobile device decrypts the session key with a private key and access the first network using the session key. In this manner, interworking is implemented without requiring the deployment of a special interworking function to bridge between the two different types of networks.
Owner:THOMSON LICENSING SA

Transitive authentication authorization accounting in the interworking between access networks

A method and a system for allowing a user device that has already been authenticated by a first communications network to gain access to a second communications network without undergoing authentication by the second communications network. The first communications network and the second communications network have a pre-established trust relationship there between. A packet is received from the user device that includes a user device public key, by the second network via the first network. A session key is sent from the second network to the user device, via the first network, when a source Internet Protocol (IP) address associated with the packet falls into a range allocated to the first network. The session key is encrypted with the user device public key. The user device decrypts the session key using a private key and uses the session key thereafter to access the second network. Further a mapping is generated to correlate the identity of the user device with the session key such that usage data relate to user device is generated by the second communications network and transmitted to the first communications network, which generates accounting information indicative of user device access of the second communications network.
Owner:INTERDIGITAL CE PATENT HLDG

A system and method for oriented and customized distribution of the network contents

InactiveCN101056187APossess the ability to release customized information in a targeted mannerSpecial service provision for substationIp addressGeolocation
The invention discloses a system and method for issuing the network contents in the fixed position, orientation and customized mode, this system framework consists of user terminal equipment, network access point equipment, intelligent network boundary system, network information application server, user authentication accounting and positioning system and contents management system. The intelligent network boundary system has the contents index matching subsystem, contents buffer memory subsystem, contents reading subsystem and contents issuing subsystem; the contents management system shall save and manage the information issued to the network users by the network operator or network owner; the user authentication accounting and positioning system has the system user name / IP address / user access point equipment / geographic position database. With the network contents issuing system and method in fixed position, orientation and customized mode, the network operator may issue the network contents to all network clients in the fixed position, orientation and customized mode.
Owner:王伟珣

Access processing method, base station and terminal

InactiveCN102143552APrevent re-accessReduce wasteAssess restrictionMicrowaveAir interface
The embodiment of the invention provides an access processing method, a base station and a terminal. The method comprises the following steps of: receiving an access request message, transmitted by the terminal, by the base station; transmitting an access control message to the terminal by the base station if access failure frequency of the terminal reaches a preset threshold value so as not to transmit the access request message to the base station any longer by the terminal in a period of time; or transmitting the access control message to the terminal so as not to transmit the access request message to the base station any loner by the terminal. According to the technical scheme provided by the embodiment of the invention, the access of the terminal with multiple continuous access fails and due and temporarily-defaulting account or other illegal terminals during interaction between the terminal and the base station can be controlled, so that reaccess of the illegal terminals is prevented or interval time of adjacent access requests of the terminal is prolonged; and waste of an air interface and ground link bandwidth in an interactive authentication process between an abnormal user terminal and AAA (Authentication Authorization Accounting) can be reduced, so that uplink bandwidth resources of a normal Wimax (Worldwide Interoperability for Microwave Access) user can be guaranteed.
Owner:HUAWEI TECH CO LTD

Fixed network perception user access method and system thereof

ActiveCN102457847ASupport for the implementation of admission controlSupport admission controlAssess restrictionConnection managementAccess methodBroadband
The invention discloses a fixed network perception user access method and a system thereof. The method is characterized in that: based on an authentication process phase of a mobile network to user equipment, authentication authorization and accounting (AAA) of a 3rd generation partnership project (3GPP) acquires user access information and further transmits to the AAA of a broadband forum (BBF); the AAA of the BBF provides the user access information to a broadband policy control function (BPCF); the BPCF discovers a policy and charging rules function (PCRF) which are served for the user according to the received user access information and initiates session establishment to the PCRF. By using the method and the system of the invention, fixed network equipment can identify user access according to the user access information so as to support and implement admission control to the service which is developed for the user.
Owner:ZTE CORP

AAA server, P-GW, PCRF, obtaining method and system for customer equipment identification

The invention discloses an acquisition method for an AAA server, P-GW, PCRF and a user device mark and a system thereof, wherein the acquisition method of the user device mark comprises conducting the access authorization for an authorization accounting server and a user device, sending the access receiving information for an external agent of a non 3GPP access network by the authorization accounting server, and then carrying the true mark of the user device in the access receiving information, and sending the true mark of the user device to a grouping data network gateway by the authorization accounting server after verifying that the user device mark is a false mark of the user device in the authorization process of the authorization accounting server and the grouping data network gateway. The invention further provides an authorization accounting server, a grouping data network gateway, a strategic accounting control functional entity, an acquisition method of a user device mark and a system thereof. A non 3GPP terminal can be assured to directly access into an EPC network through the invention.
Owner:ZTE CORP

Control method and device for network address translation service

The invention provides an operation control method for Network Address Transformation (NAT), which includes the following steps: the description information of NAT service corresponding to the user is firstly established in an Authentication, Authorization, Accounting (AAA) server, when the user gets online and passes the authentication and authorization, the description information of NAT service can be obtained from the AAA server, and the NAT gateway can control the NAT operation of the user according to the description information. The invention also provides a control device for NAT operation. By using the technical proposal of the invention, the flexibility of the NAT operation control can be enhanced and the individualized NAT service for the users can be realized.
Owner:NEW H3C TECH CO LTD

Network architecture of backward compatible authentication, authorization and accounting system and implementation method

This invention relates to one back compatible identification charging system network structure, which comprises network interface servo translation agent, local servo translating agent, relay agent, and trustee agent, network interface servo and local identification charging servo, wherein, the network structure is divided into service area A, B, and C according to each local identification servo and connecting internet according to management areas of I, II and agent.
Owner:SOUTHEAST UNIV

Network access method and system

The invention discloses a network access method and a network access system. The network access method comprises the following steps: performing identity authentication on a network terminal based on a Radius protocol through an operator network BNG (broadband network gateway) and an AAA (authentication authorization accounting) server; in response to passing of the identity authentication, sending an identity authentication passing message for the network terminal to an access management unit of a cloud computing platform by the AAA server, so that when the network terminal logs in a virtual dual-stack host system of the cloud computing platform, the access management unit of the cloud computing platform can directly identify the network terminal according to the identity authentication passing message sent by the AAA server, and allows the network terminal to log in the virtual dual-stack host system. According to the technical scheme provided by the invention, secondary authentication on the network terminal caused by isolation between the BNG equipment of a network layer and the cloud computing platform of an application layer is avoided, the authentication flow of a user is simplified, and meanwhile, the user can conveniently access the internet through the virtual dual-stack host system provided by the cloud computing platform.
Owner:CHINA TELECOM CORP LTD

Transitive authentication authorization accounting in the interworking between access networks

A method and a system for allowing a user device that has already been authenticated by a first communications network to gain access to a second communications network without undergoing authentication by the second communications network. The first communications network and the second communications network have a pre-established trust relationship there between. A packet is received from the user device that includes a user device public key, by the second network via the first network. A session key is sent from the second network to the user device, via the first network, when a source Internet Protocol (IP) address associated with the packet falls into a range allocated to the first network. The session key is encrypted with the user device public key. The user device decrypts the session key using a private key and uses the session key thereafter to access the second network. Further a mapping is generated to correlate the identity of the user device with the session key such that usage data relate to user device is generated by the second communications network and transmitted to the first communications network, which generates accounting information indicative of user device access of the second communications network.
Owner:INTERDIGITAL CE PATENT HLDG

Terminal shift management system and method thereof

The present invention relates to a terminal control system, and more particularly, to a system and a method which allows a user to shift an IP service from a terminal to which the service is currently provided to a user's other terminal, thereby enabling the user to continuously using the IP service without disconnection. The system comprises: an authentication authorization accounting (AAA) interface unit which receives unique information having fixed properties with respect to a terminal authenticated by a subscriber terminal authentication system and a user of the authenticated terminal; a terminal interface unit which receives status information having variable properties with respect to the authorized terminal and a currently used service; a unique information managing unit which stores and manages the unique information; a status information managing unit which stores and manages the status information; and a terminal shift management control unit which provides information regarding terminals available for the current service with reference to the unique information and the status information, when there is a terminal shift request, generates service session information which is required when the currently used service is sent to a terminal selected from the information and sends the generated service session information to the selected terminal to which the service is to be shifted. Accordingly, the user of the terminal can conveniently change the terminal to continuously use the IP service without disconnection while using the IP service.
Owner:ELECTRONICS & TELECOMM RES INST

Gateway identifier reporting method and system thereof

The invention discloses a gateway identifier reporting method. A packet data network gateway (P-GW) identifier is reported to a home subscriber server (HSS) / authentication, authorization and accounting server (AAA) by an evolutionary packet data gateway (ePDG). The invention additionally discloses a gateway identifier reporting system, which comprises a reporting unit used for the ePDG to report the P-GW identifier to the HSS / AAA. By adopting the method and the system disclosed by the invention, the operational process can be unified and the operation can be simplified in different scenes of 3rd generation partnership project (3GPP) access and non-3GPP access.
Owner:ZTE CORP

A network system, policy management control server and policy management control method

The embodiment of the invention discloses a network system, comprising a network access server, an authentication charging server and a service server, also comprising: a strategy manage control server for acquiring user service using state information to generate strategy control information according to the service server and / or the authentication charging server, the strategy control information is used for directing the network access server to manage and control the conversation of users, and sending the generated strategy control information to the network access server; the network access server manages and controls the conversation of users according to the strategy control information. The embodiment of the invention also discloses a strategy manage control server, a service server and an authentication charging server. The invention can improves user conversation reliability of a NAS device during using the service.
Owner:HUAWEI TECH CO LTD

Configuration method and system of Linux virtual server

The invention relates to configuration method and system of a Linux virtual server, wherein the configuration system of the Linux virtual server comprises an LVS (Linux Virtual Server), a user interface module, an AAA (Authentication Authorization Accounting) client and an instruction translating module, wherein the user interface module is used for transmitting received configuration instruction information to the AAA client and then transmitting successfully authorized configuration instruction information to the instruction translation module when receiving an authorization result returned by the AAA client, wherein the authorization result represents that the configuration instruction information is successfully authorized; the AAA client is used for transmitting the configuration instruction information to an AAA server and then transmitting the authorization result returned by the AAA server to the user interface module; and the instruction translating module is used for translating a successfully authorized configuration instruction into an operation instruction supported by the LVS and executing or notifying the LVS to execute configuration operation corresponding to the operation instruction. The invention improves the convenience for users to maintain network systems containing the LVS.
Owner:BAIDU ONLINE NETWORK TECH (BEIJIBG) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products