CN103138979A - Network access management method and network access facility - Google Patents

Network access management method and network access facility Download PDF

Info

Publication number
CN103138979A
CN103138979A CN2011103890196A CN201110389019A CN103138979A CN 103138979 A CN103138979 A CN 103138979A CN 2011103890196 A CN2011103890196 A CN 2011103890196A CN 201110389019 A CN201110389019 A CN 201110389019A CN 103138979 A CN103138979 A CN 103138979A
Authority
CN
China
Prior art keywords
user terminal
trust level
level information
network access
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2011103890196A
Other languages
Chinese (zh)
Other versions
CN103138979B (en
Inventor
谭敏
邓巍
曾华荣
赵林华
卢龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Global Innovation Polymerization LLC
Tanous Co
Original Assignee
Huawei Device Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Family has litigation
First worldwide family litigation filed litigation Critical https://patents.darts-ip.com/?family=48498320&utm_source=google_patent&utm_medium=platform_link&utm_campaign=public_patent_search&patent=CN103138979(A) "Global patent litigation dataset” by Darts-ip is licensed under a Creative Commons Attribution 4.0 International License.
Application filed by Huawei Device Co Ltd filed Critical Huawei Device Co Ltd
Priority to CN201110389019.6A priority Critical patent/CN103138979B/en
Priority to PCT/CN2012/084877 priority patent/WO2013078954A1/en
Publication of CN103138979A publication Critical patent/CN103138979A/en
Application granted granted Critical
Publication of CN103138979B publication Critical patent/CN103138979B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • H04L41/5061Network service management, e.g. ensuring proper service fulfilment according to agreements characterised by the interaction between service providers and their network customers, e.g. customer relationship management
    • H04L41/5067Customer-centric QoS measurements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0811Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking connectivity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • H04L43/55Testing of service level quality, e.g. simulating service usage

Abstract

The invention discloses a network access management method which includes seeking prestored trust level information of a subscriber terminal when the subscriber terminal is successfully linked with a network access facility; judging that whether an administration server is triggered to prompt an administrator that the subscriber terminal is successfully linked with the network access facility according to the trust level information of the subscriber terminal when the trust level information of the subscriber terminal is found; and sending the administration server a trigger message including subscriber terminal identity information and trust level information when a judgment result is yes. The invention also discloses the network access facility. According to the network access management method and network access facility, the monitoring by the administrator over the status of the linkage between the subscriber terminal and the network access facility can be favored.

Description

Network access management method and network access equipment
Technical field
The present invention relates to administrative skill, relate in particular to a kind of network access management method and network access equipment.
Background technology
At present, user terminal is by means of wireless router or ONT (Optical network termination, Optical Network Terminal) etc. the network access equipment connecting Internet is more and more general, usually one family can be equipped with a router, provides the network insertion service by this router for desktop computers all in family, notebook computer, facsimile machine or miscellaneous equipment; When the manager need to understand current time and has which user terminal to access router, the manager can login router by webpage, check from the administration page of router, for example: the user with arbitrary computer with after router is connected, input 192.168.x.x in browser, with the administration page of login router, the information of the user terminal of current couple in router is checked; Because need to initiatively logining router, user in existing can check at current time have which user terminal to access router, to be unfavorable for the real-time access situation of the network access equipments such as user monitoring router or ONT.
Summary of the invention
Embodiment of the present invention technical problem to be solved is, a kind of network access management method and network access equipment are provided, and can facilitate manager's situation of supervisory user terminal interconnection network access device in real time.
In order to solve the problems of the technologies described above, the embodiment of the present invention provides a kind of network access management method, comprising:
When user terminal success interconnection network access device, the trust level information of searching the described user terminal that prestores;
When finding the trust level information of described user terminal, judge whether to trigger the successful interconnection network access device of the management described user terminal of server prompts manager according to the trust level information of described user terminal;
When judgment result is that when being, send to described management server and comprise the identity information of described user terminal and the triggering message of trust level information.
Correspondingly, the embodiment of the present invention also provides a kind of network access equipment, comprising:
Search module, be used for searching the trust level information of the described user terminal that prestores when user terminal successfully connects described network access equipment;
Judge module is used for when find the trust level information of described user terminal, judges whether to trigger according to the trust level information of described user terminal and manages the described user terminal of server prompts manager and successfully connect described network access equipment;
Sending module is used for when judgment result is that of described judge module is, sends to described management server to comprise the identity information of described user terminal and the triggering message of trust level information.
Implement the embodiment of the present invention, have following beneficial effect:
The embodiment of the present invention is after user terminal success interconnection network access device, search the trust level information of the described user terminal that prestores, and when finding the trust level information of described user terminal, judge whether to trigger the successful interconnection network access device of the management described user terminal of server prompts manager according to the trust level information of described user terminal, and judgment result is that when being, send to management server and trigger message, to trigger the successful interconnection network access device of the management described user terminal of server prompts manager.Due to after user terminal success interconnection network access device, trust level information according to user terminal, trigger on one's own initiative the successful interconnection network access device of management server prompts this user terminal of manager, and do not need manager's logging in network access device to check, therefore can facilitate manager's situation of supervisory user terminal interconnection network access device in real time.
Description of drawings
In order to be illustrated more clearly in the technical scheme in the embodiment of the present invention, the below will do to introduce simply to the accompanying drawing of required use in embodiment or description of the Prior Art, apparently, accompanying drawing in the following describes is only some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing.
Fig. 1 is the schematic flow sheet of the first embodiment of network access management method of the present invention;
Fig. 2 is the schematic flow sheet of the second embodiment of network access management method of the present invention;
Fig. 3 is the schematic flow sheet of the 3rd embodiment of network access management method of the present invention;
Fig. 4 is the structural representation of the first embodiment of network access equipment of the present invention;
Fig. 5 is the structural representation of the second embodiment of network access equipment of the present invention;
Fig. 6 is the structural representation of the 3rd embodiment of network access equipment of the present invention;
Fig. 7 is the structural representation of the embodiment of net access management system of the present invention.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is only the present invention's part embodiment, rather than whole embodiment.Based on the embodiment in the present invention, those of ordinary skills belong to the scope of protection of the invention not making the every other embodiment that obtains under the creative work prerequisite.
Please refer to Fig. 1, it is the schematic flow sheet of the first embodiment of network access management method of the present invention, the executive agent of described method can be: ONT (Optical Network Terminal), be understandable that, those skilled in the art can expect reasonably that the executive agent of Fig. 1 method flow can also be the equipment of network insertion service that similarly provides with ONT, for example: router.Particularly, the method flow of Fig. 1 comprises:
Step S11, when user terminal success interconnection network access device, the trust level information of searching the described user terminal that prestores.
Wherein, the user can arrange password for network access equipments such as ONT in practice, also password can be set.In step S11, when ONT was provided with password, user terminal success interconnection network access device successfully connected ONT after can referring to that user terminal has passed through the password authentification of ONT; When ONT did not arrange password, user terminal success interconnection network access device directly successfully was connected to ONT after can referring to that user terminal searches ONT.
The trust level information of user terminal can be pre-stored in the memory (for example: programmable read only memory, Erasable Programmable Read Only Memory EPROM or flash memory) of ONT, and the trust level information of user terminal can comprise: high trust level information, monitoring class information or distrust class information; Be understandable that, the trust level information that different user terminals has can be its configuration by the manager; It will also be appreciated that, the trust level information of user terminal has represented the different trusted situations of manager to user terminal, the manager also can be as required be divided into high trust level information, middle trust level information and low trust level information with user's trust level information, middle trust level information herein is equivalent to monitor class information, and low trust level information is equivalent to distrust class information.In the present embodiment, classification configurations method or the division collocation method of trust level information are not limited.
Step S12 when step S11 finds the trust level information of user terminal, judges whether to trigger the successful interconnection network access device of management server prompts this user terminal of manager according to described trust level information.
Wherein, when the trust level information of the user terminal that finds as step S11 was high trust level information, the determination result is NO for step S12, namely do not need to trigger the successful interconnection network access device of management server prompts this user terminal of manager; For example: the manager can be configured to management server high trust level information, thereby when avoiding the manager to use management server access network access device, carries out unnecessary prompting at every turn.
The trust level information of the user terminal that finds as step S11 is during for the monitoring class information, and judgment result is that of step S12 is namely to need to trigger the successful interconnection network access device of management server prompts this user terminal of manager; For example: in one family, the computer that father and mother can use children or the trust level information of smart mobile phone are configured to monitor class information, thereby when children surf the Net by ONT later at every turn, father and mother all can be known this situation by the prompting of management server, are beneficial to father and mother and strengthen the surf the Net supervision of situation to children.
The trust level information of the user terminal that finds as step S11 is when distrusting class information, and judgment result is that of step S12 is namely to need to trigger this user terminal of management server prompts manager and permitted authentication by network insertion; For example: with illegal user terminal (such as: the user terminal of other family) be configured to distrust class information after, management server can be when illegal user terminal success interconnection network access device, receive the triggering message of network access equipment, thereby the illegal successful interconnection network access device of user terminal of prompting manager, make the manager find in time the user terminal of illegal invasion, thereby take effective treatment measures; , need to prove if the trust level information of the user terminal that finds is when distrusting class information, can directly shield this user terminal herein, interrupt its network insertion service, to avoid disabled user's terminal occupying bandwidth resources.
Step S13 when judgment result is that of step S12 is, comprises the identity information of described user terminal and the triggering message of trust level information to described management server transmission.
Wherein, the identity information of user terminal comprises: any one in the IP address of user terminal, MAC (Medium Access Control, media access control layer) address and user name or multinomial, preferably, the identity information of user terminal comprises user name.
particularly, the identity information of user terminal can obtain from user terminal sends to the message of ONT, these messages comprise: DHCP (Dynamic Host Configuration Protocol, DynamicHost arranges agreement) message, PPPOE (point-to-point protocol over ethernet, point-to-point protocol on Ethernet) message or ARP (address resolution Protocol, address resolution protocol) message, this sentences the DHCP message is example, the MAC Address of obtaining user terminal and the process of user name are described, user terminal is by sending a DHCP DISCOVER message to ONT, take request ONT as its distributing IP address, carry MAC Address and the user name of user terminal in this DHCP DISCOVER message, therefore ONT can resolve this DHCP DISCOVER message, thereby obtain MAC Address and the user name of user terminal, need to prove, ONT also can adopt other mode to get the identity information of user terminal, the mode of for example finding by neighbours.
Further, the triggering message that step S13 generates can be to meet UPnP (Universal Plug and Play, UPnP) message of agreement, that is to say between ONT and management server and can adopt the UPnP framework, adopt the benefit of this framework to be, ONT plays control action as main equipment, and management server will be controlled and serve separately as service function from equipment.
Further, after management server receives and triggers message, can adopt the mode that plays window to point out the described user terminal of manager successful interconnection network access device.Particularly, resolve the triggering message that receives when management server, obtain identity information and the trust level information of user terminal; Then identity information and the trust level information with user terminal writes in predefined window, and ejects described window in the lower right corner of desktop, with the successful interconnection network access device of the prompting described user terminal of manager.
The embodiment of the present invention is after user terminal success interconnection network access device, search the trust level information of the described user terminal that prestores, and when finding the trust level information of described user terminal, judge whether to trigger the successful interconnection network access device of the management described user terminal of server prompts manager according to the trust level information of described user terminal, and judgment result is that when being, send to management server and trigger message, to trigger the successful interconnection network access device of the management described user terminal of server prompts manager.Due to after user terminal success interconnection network access device, trust level information according to user terminal, trigger on one's own initiative the successful interconnection network access device of management server prompts this user terminal of manager, and do not need manager's logging in network access device to check, therefore can facilitate manager's situation of supervisory user terminal interconnection network access device in real time.
Please refer to Fig. 2, is the schematic flow sheet of the second embodiment of network access management method of the present invention, when step S11 finds the trust level information of user terminal, also carries out:
Step S14 when step S11 finds user's trust level information, according to the trust level information of the user terminal that finds, forbids or allows described accessing user terminal to network.
Particularly, when the level of trust of the user terminal that finds is high trust level information or monitoring trust level information, normally provide the network insertion service for user terminal; When the level of trust of the user terminal that finds is the distrust class information, interrupt the network insertion service of user terminal; Be generally the user terminal of illegal invasion owing to having the user terminal of distrusting class information, so interrupt the network insertion service of disabled user's terminal, can avoid disabled user's terminal occupying Internet resources.
Please refer to Fig. 3, is the schematic flow sheet of the 3rd embodiment of network access management method of the present invention, and described method comprises:
Step S31, when user terminal success interconnection network access device, the trust level information of searching the described user terminal that prestores.This step is identical with step S11 in Fig. 1, is not repeated herein.
Step S32, when step S31 did not find the trust level information of described user terminal, request management server prompts manager configured the trust level information of described user terminal.
Particularly, the trust level information of request management server configure user terminal can comprise: the configuring request that generates the identity information that comprises user terminal; The configuring request that generates is sent to management server, trigger the trust level information of management server prompts manager configure user terminal.
After management server receives configuring request, can adopt the mode that plays window to point out the manager to configure the trust level information of described user terminal herein.
Need to prove after the manager has configured the trust level information of user terminal by management server herein, the trust level information of network access equipment recording user terminal, for example: the manager that network access equipment receiving management server sends configures the trust level information to user terminal, and the trust level information of storing described user terminal.
Also need to prove herein, after the trust level information of step S32 request management server prompts manager configure user terminal, if the manager is configured to distrust class information with the trust level information of user terminal, interrupt immediately the network insertion of this user terminal.
Also need to prove herein, when step S31 does not find the trust level information of user terminal, show that user terminal is unknown user terminal, so when step S32 request management server prompts manager configures the trust level information of described user terminal, can directly shield this unknown user terminal, namely end the network insertion service of this unknown user terminal.
Above-mentioned network access management method to the embodiment of the present invention is illustrated, and is introduced below in conjunction with network access equipment and the network insertion management system of accompanying drawing to the embodiment of the present invention.
Please refer to Fig. 4, it is the structural representation of the first embodiment of network access equipment of the present invention, network access equipment 4 in Fig. 4 can be ONT (Optical Network Terminal), be understandable that, those skilled in the art can expect reasonably that the network access equipment 4 in Fig. 4 can also be the equipment of realization and ONT similar functions, for example: router.Particularly, network access equipment 4 comprises: search module 41, judge module 42 and sending module 43.
Search module 41, when being used for user terminal success interconnection network access device 4, the trust level information of searching the described user terminal that prestores.
Wherein, network access equipment 4 may be provided with password by the user in practice, may password be also empty.When therefore network access equipment 4 was provided with password, network access equipment 4 successfully is connected with user terminal can refer to that user terminal has passed through the password authentification of network access equipment 4, thereby successfully is connected to network access equipment 4; Also can refer to when network access equipment 4 does not arrange password, when user terminal searches network access equipment, directly successfully be connected to network access equipment 4.
The memory of network access equipment 4 stores the trust level information of different user terminals in (comprising: programmable read only memory, Erasable Programmable Read Only Memory EPROM or flash memory).Particularly, the trust level information of user terminal can comprise: high trust level information, monitoring class information or distrust class information are understandable that the trust level information configured in advance of user terminal is in network access equipment 4; It will also be appreciated that, the trust level information of user terminal has represented the different trusted situations of manager to user terminal, the manager also can be as required be divided into high trust level information, middle trust level information and low trust level information with user's trust level information, middle trust level information herein is equivalent to monitor class information, and low trust level information is equivalent to distrust class information.
Judge module 42 is used for when searching module 41 when finding the trust level information of user terminal, judges whether to trigger according to described trust level information and manages the successful interconnection network access device 4 of server prompts this user terminal of manager.
Wherein, when the trust level information of searching the user terminal that module 41 finds was high trust level information, the determination result is NO for judge module 42, namely needn't trigger the successful interconnection network access device 4 of management server prompts this user terminal of manager; For example: the manager can be configured to management server high trust level information, thereby when avoiding the manager to use management server access network access device, carries out unnecessary prompting at every turn.
During for the monitoring class information, judgment result is that of judge module 42 is namely to need to trigger the successful interconnection network access device 4 of management server prompts this user terminal of manager when the trust level information of searching the user terminal that module 41 finds; For example: in one family, the computer that father and mother can use children or the trust level information of smart mobile phone are configured to monitor class information, thereby when children surf the Net by ONT later at every turn, father and mother all can be known this situation by the prompting of management server, are beneficial to father and mother and strengthen the surf the Net supervision of situation to children.
When distrusting class information, the determination result is NO for judge module 42, namely needs to trigger this user terminal of management server prompts manager and permitted authentication by network insertion when the trust level information of searching the user terminal that module 41 finds; For example: with illegal user terminal (such as: the user terminal of other family) be configured to distrust class information after, management server can be when illegal user terminal success interconnection network access device, receive the triggering message of network access equipment, thereby the illegal successful interconnection network access device of user terminal of prompting manager, make the manager find in time the user terminal of illegal invasion, thereby take effective treatment measures; , need to prove if the trust level information of the user terminal that finds is when distrusting class information, can directly shield this user terminal herein, interrupt its network insertion service, to avoid disabled user's terminal occupying bandwidth resources.
Sending module 43 is used for when judgment result is that of judge module 42 is, sends to described management server to comprise the identity information of user terminal and the triggering message of trust level information.
Wherein, the identity information of user terminal comprises: any one in the IP address of user terminal, MAC (Medium Access Control, media access control layer) address and user name or multinomial, preferably, the identity information of user terminal comprises user name.
particularly, the identity information of user terminal can obtain from user terminal sends to the message of ONT, these messages comprise: the DHCP message, PPPOE message or ARP message, this sentences the DHCP message is example, the MAC Address of obtaining user terminal and the process of user name are described, user terminal is by sending a DHCP DISCOVER message to ONT, take request ONT as its distributing IP address, carry MAC Address and the user name of user terminal in this DHCP DISCOVER message, therefore ONT can resolve this DHCP DISCOVER message, thereby obtain MAC Address and the user name of user terminal, need to prove, ONT also can adopt other mode to get the identity information of user terminal, the mode of for example finding by neighbours.
Further, the triggering message that sending module 43 generates can be the message that meets the UPnP agreement, that is to say between ONT and management server and can adopt the UPnP framework, adopt the benefit of this framework to be, ONT plays control action as main equipment, management server will be controlled and serve separately as service function from equipment.
Further, after management server receives and triggers message, can adopt the mode that plays window to point out the described user terminal of manager successful interconnection network access device.Particularly, resolve the triggering message that receives when management server, obtain identity information and the trust level information of user terminal; Then identity information and the trust level information with user terminal writes in predefined window, and ejects described window in the lower right corner of desktop, with the successful interconnection network access device of the prompting described user terminal of manager.
The embodiment of the present invention is after user terminal success interconnection network access device, search the trust level information of the described user terminal that prestores, and when finding the trust level information of described user terminal, judge whether to trigger the successful interconnection network access device of the management described user terminal of server prompts manager according to the trust level information of described user terminal, and judgment result is that when being, send to management server and trigger message, to trigger the successful interconnection network access device of the management described user terminal of server prompts manager.Due to after user terminal success interconnection network access device, trust level information according to user terminal, trigger on one's own initiative the successful interconnection network access device of management server prompts this user terminal of manager, and do not need manager's logging in network access device to check, therefore can facilitate manager's situation of supervisory user terminal interconnection network access device in real time.
Please refer to Fig. 5, is the structural representation of the second embodiment of network access equipment of the present invention, and Fig. 5 compares with Fig. 4, and network access equipment 4 also comprises:
Network insertion administration module 44 is used for when searching the users to trust class information that module 41 finds, and forbids or allows described accessing user terminal to network according to the trust level information of described user terminal.
Particularly, when the level of trust of searching the user terminal that module 41 finds is high trust level information or monitoring trust level information, normally provide the network insertion service for user terminal; When distrusting class information, interrupt the network insertion service of user terminal when the level of trust of searching the user terminal that module 41 finds; Be generally the user terminal of illegal invasion owing to having the user terminal of distrusting class information, so interrupt the network insertion service of disabled user's terminal, can avoid disabled user's terminal occupying Internet resources.
Please refer to Fig. 6, is the structural representation of the 3rd embodiment of network access equipment of the present invention, and Fig. 6 compares with Fig. 4, also comprises: request configuration module 44.
Wherein, request configuration module 44 is used for when searching module 41 when not finding the trust level information of described user terminal, and the request management server configures the trust level information of described user terminal.Particularly, request configuration module 44 comprises: configuring request generation unit 441 is used for the configuring request that generation comprises the identity information of described user terminal; Configuring request transmitting element 442 is used for described configuring request is sent to management server, triggers the trust level information that management server prompts manager configures described user terminal.
After management server receives configuring request, can adopt the mode that plays window to point out the manager to configure the trust level information of described user terminal herein.
Need to prove after the manager has configured the trust level information of user terminal by management server herein, the trust level information of network access equipment 4 recording user terminals, for example: the manager that network access equipment 4 receiving management servers send configures the trust level information to user terminal, and the trust level information of storing described user terminal.
Also need to prove herein, after the trust level information of request configuration module 44 request management server prompts manager configure user terminals, if the manager is configured to distrust class information with the trust level information of user terminal, interrupt immediately the network insertion of this user terminal.
Also need to prove herein, when searching module 41 when not finding the trust level information of user terminal, show that user terminal is unknown user terminal this moment, so when request configuration module 44 request management server prompts managers configure the trust level information of described user terminal, can directly shield this unknown user terminal, namely end the network insertion service of this unknown user terminal.
Please refer to Fig. 7, is the structural representation of the embodiment of network insertion management system of the present invention, and this network insertion management system comprises: network access equipment 4, management server 5 and at least one user terminal 6.
Wherein, network access equipment 4 can be the network access equipment shown in arbitrary figure 4 in Fig. 4-6.Management server 5 can be realized by PC (Personal Computer, personal computer), and be understandable that, management server 5 also can be used as user terminal.User terminal 6 can be smart mobile phone, PDA (Personal Digital Assistant, personal digital assistant), panel computer, notebook computer, desktop computer, facsimile machine or printer.
in the present embodiment, after the successful interconnection network access device 4 of arbitrary user terminal 6, when if the trust level information of this user terminal is monitoring trust level information or distrust class information, network access equipment 4 all sends to management server 5 and triggers message, 5 receive trigger message after, in the mode that plays window, identity information and the trust level information of this user terminal 6 is shown to the manager, facilitate manager's current access situation of monitor network access device 4 in real time, and when the trust level information of user terminal 6 is when distrusting class information, network access equipment 4 is initiatively forbidden the network insertion of user terminal 6, thereby effectively prevent disabled user's terminal occupying Internet resources.
One of ordinary skill in the art will appreciate that all or part of flow process that realizes in above-described embodiment method, to come the relevant hardware of instruction to complete by computer program, described program can be stored in a computer read/write memory medium, this program can comprise the flow process as the embodiment of above-mentioned each side method when carrying out.Wherein, described storage medium can be magnetic disc, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc.
Above disclosed is only preferred embodiment of the present invention, certainly can not limit with this interest field of the present invention, one of ordinary skill in the art will appreciate that all or part of flow process that realizes above-described embodiment, and according to the equivalent variations that claim of the present invention is done, still belong to the scope that invention is contained.

Claims (13)

1. a network access management method, is characterized in that, comprising:
When user terminal success interconnection network access device, the trust level information of searching the described user terminal that prestores;
When finding the trust level information of described user terminal, judge whether to trigger the successful interconnection network access device of the management described user terminal of server prompts manager according to the trust level information of described user terminal;
When judgment result is that when being, send to described management server and comprise the identity information of described user terminal and the triggering message of trust level information.
2. the method for claim 1, is characterized in that, described trust level information comprises: high trust level information, monitoring class information or distrust class information.
3. method as claimed in claim 2, it is characterized in that, when the trust level information of the described user terminal that finds is high trust level information, described trust level information according to user terminal judges whether to trigger the step of managing the successful interconnection network access device of the described user terminal of server prompts manager, and the determination result is NO, do not send to described management server to comprise the identity information of described user terminal and the triggering message of trust level information.
4. method as claimed in claim 2, it is characterized in that, when the trust level information of the described user terminal that finds was monitoring class information or distrust class information, described trust level information according to user terminal judged whether that judgment result is that of step of triggering the successful interconnection network access device of the management described user terminal of server prompts manager is.
5. as claim 2 or 3 or 4 described methods, it is characterized in that, also comprise:
When the trust level information of the described user terminal that finds is high trust level information or monitoring class information, allow described accessing user terminal to network;
When the trust level information of the described user terminal that finds is the distrust class information, forbid described accessing user terminal to network.
6. method as described in any one in claim 1-5, is characterized in that, also comprises:
When not finding the trust level information of described user terminal, request management server prompts manager configures the trust level information of described user terminal.
7. method as claimed in claim 6, is characterized in that, the step of the trust level information of the described user terminal of described request management server configuration comprises:
Generation comprises the configuring request of the identity information of described user terminal;
Described configuring request is sent to described management server, trigger the trust level information that management server prompts manager configures described user terminal.
8. a network access equipment, is characterized in that, comprising:
Search module, be used for searching the trust level information of the described user terminal that prestores when user terminal successfully connects described network access equipment;
Judge module is used for when find the trust level information of described user terminal, judges whether to trigger according to the trust level information of described user terminal and manages the described user terminal of server prompts manager and successfully connect described network access equipment;
Sending module is used for when judgment result is that of described judge module is, sends to described management server to comprise the identity information of described user terminal and the triggering message of trust level information.
9. network access equipment as claimed in claim 8, is characterized in that, described trust level information comprises: high trust level information, monitoring class information or distrust class information.
10. network access equipment as claimed in claim 9, is characterized in that, when the trust level information of the described user terminal that finds was monitoring class information or distrust class information, judgment result is that of described judge module was.
11. network access equipment as described in claim 9 or 10 is characterized in that, also comprises:
The network insertion administration module, be used for when the trust level information of the described user terminal that finds is high trust level information or monitoring class information, allow described accessing user terminal to network, when the trust level information of the described user terminal that finds is the distrust class information, forbid described accessing user terminal to network.
12. network access equipment as described in any one in claim 8-11 is characterized in that, also comprises:
The request configuration module is used for when not finding the trust level information of described user terminal, the trust level information of the described user terminal of request management server configuration.
13. network access equipment as claimed in claim 12 is characterized in that, the described request configuration module comprises:
The configuring request generation unit is used for the configuring request that generation comprises the identity information of described user terminal;
The configuring request transmitting element is used for described configuring request is sent to described management server, triggers the trust level information that management server prompts manager configures described user terminal.
CN201110389019.6A 2011-11-30 2011-11-30 Network access management method and network access equipment Active CN103138979B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201110389019.6A CN103138979B (en) 2011-11-30 2011-11-30 Network access management method and network access equipment
PCT/CN2012/084877 WO2013078954A1 (en) 2011-11-30 2012-11-20 Network access management method and network access device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201110389019.6A CN103138979B (en) 2011-11-30 2011-11-30 Network access management method and network access equipment

Publications (2)

Publication Number Publication Date
CN103138979A true CN103138979A (en) 2013-06-05
CN103138979B CN103138979B (en) 2016-08-03

Family

ID=48498320

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201110389019.6A Active CN103138979B (en) 2011-11-30 2011-11-30 Network access management method and network access equipment

Country Status (2)

Country Link
CN (1) CN103138979B (en)
WO (1) WO2013078954A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104092674A (en) * 2014-06-30 2014-10-08 广东九联科技股份有限公司 Router network security detection method and system based on set top box
CN105357485A (en) * 2015-11-20 2016-02-24 武汉微创光电股份有限公司 Network device access authentication method in network video monitoring
CN105681352A (en) * 2016-03-21 2016-06-15 深圳融腾科技有限公司 Wi-Fi access security control method and system
CN108834180A (en) * 2018-06-14 2018-11-16 腾讯科技(深圳)有限公司 A kind of route management method and relevant device
CN110941412A (en) * 2019-11-28 2020-03-31 南京崔斯特文化创意有限公司 Method, system and terminal for realizing multi-terminal animation co-browsing based on imaging

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101267304A (en) * 2007-03-13 2008-09-17 华为技术有限公司 A network access privilege control method, device and system
CN101741554A (en) * 2008-11-21 2010-06-16 华为终端有限公司 Method for network access control, server, user network equipment and communication system
US20100303087A1 (en) * 2007-03-06 2010-12-02 Zte Corporation Method and System for Controlling Network Access
CN102149092A (en) * 2011-01-28 2011-08-10 中国联合网络通信集团有限公司 Method and device for processing user illegal access

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2005051436A (en) * 2003-07-31 2005-02-24 Canon Inc Network equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100303087A1 (en) * 2007-03-06 2010-12-02 Zte Corporation Method and System for Controlling Network Access
CN101267304A (en) * 2007-03-13 2008-09-17 华为技术有限公司 A network access privilege control method, device and system
CN101741554A (en) * 2008-11-21 2010-06-16 华为终端有限公司 Method for network access control, server, user network equipment and communication system
CN102149092A (en) * 2011-01-28 2011-08-10 中国联合网络通信集团有限公司 Method and device for processing user illegal access

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104092674A (en) * 2014-06-30 2014-10-08 广东九联科技股份有限公司 Router network security detection method and system based on set top box
CN105357485A (en) * 2015-11-20 2016-02-24 武汉微创光电股份有限公司 Network device access authentication method in network video monitoring
CN105681352A (en) * 2016-03-21 2016-06-15 深圳融腾科技有限公司 Wi-Fi access security control method and system
CN105681352B (en) * 2016-03-21 2019-03-19 深圳融腾科技有限公司 A kind of wireless network access safety management-control method and system
CN108834180A (en) * 2018-06-14 2018-11-16 腾讯科技(深圳)有限公司 A kind of route management method and relevant device
CN110941412A (en) * 2019-11-28 2020-03-31 南京崔斯特文化创意有限公司 Method, system and terminal for realizing multi-terminal animation co-browsing based on imaging
CN110941412B (en) * 2019-11-28 2023-09-22 南京崔斯特文化创意有限公司 Method, system and terminal for realizing multi-terminal animation collaborative browsing based on pictures

Also Published As

Publication number Publication date
CN103138979B (en) 2016-08-03
WO2013078954A1 (en) 2013-06-06

Similar Documents

Publication Publication Date Title
US11228593B2 (en) Session security splitting and application profiler
US20190021005A1 (en) Systems And Methods For Automatic Device Detection, Device Management, And Remote Assistance
US9350725B2 (en) Enabling access to a secured wireless local network without user input of a network password
US7707276B2 (en) Remote configuration and management via electronic mail
US20070220252A1 (en) Interactive network access controller
JP2017506034A (en) Method, device and system for dynamic network access management
CN103138979A (en) Network access management method and network access facility
US9762626B2 (en) System and method for as needed connection escalation
CN106059802B (en) Terminal access authentication method and device
US20160261569A1 (en) Device-to-Device Network Location Updates
CN113271299B (en) Login method and server
CN105744555A (en) Terminal maintenance method, maintenance device and network management server
CN109617972B (en) Connection establishing method and device, electronic equipment and storage medium
CN102546331B (en) Method and device for transmitting service information
CN106230781A (en) The method and device preventing network attack of sing on web authentication techniques
CN114710300A (en) Novel Windows remote security protection method
US20170187643A1 (en) Virtual Cloud Security Managed By Reverse Avatars
CN113285920A (en) Service access method, device, equipment and storage medium
CN106100889A (en) The Enhancement Method of a kind of snmp protocol safety and device
US20150341328A1 (en) Enhanced Multi-Level Authentication For Network Service Delivery
US11979377B2 (en) Internet connection management system for information communication device, method therefor, and internet connection management program installed in information communication device
US11985130B2 (en) Session security splitting and application profiler
CN116015918A (en) NAT environment-based terminal network access control method and device, electronic equipment and storage medium
CN110912858B (en) Security monitoring method and device based on friendly password strategy
US20240104200A1 (en) Systems and methods for identity and access risk reduction informed by risk signaling and device posture

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20180213

Address after: California, USA

Patentee after: Global innovation polymerization LLC

Address before: California, USA

Patentee before: Tanous Co.

Effective date of registration: 20180213

Address after: California, USA

Patentee after: Tanous Co.

Address before: 518129 Longgang District, Guangdong, Bantian HUAWEI base B District, building 2, building No.

Patentee before: HUAWEI DEVICE Co.,Ltd.

TR01 Transfer of patent right
DD01 Delivery of document by public notice

Addressee: Hefei Intellectual Property Office

Document name: Notice of the state of the case of invalidation

DD01 Delivery of document by public notice