TWI223941B - System and method for managing network access - Google Patents

System and method for managing network access Download PDF

Info

Publication number
TWI223941B
TWI223941B TW90100748A TW90100748A TWI223941B TW I223941 B TWI223941 B TW I223941B TW 90100748 A TW90100748 A TW 90100748A TW 90100748 A TW90100748 A TW 90100748A TW I223941 B TWI223941 B TW I223941B
Authority
TW
Taiwan
Prior art keywords
user
message
item
network
application
Prior art date
Application number
TW90100748A
Other languages
Chinese (zh)
Inventor
Dory E Leifer
Allan C Rubens
David J Carson
Richard L M Herrell
Todd A Bachmann
Original Assignee
Tut Systems Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tut Systems Inc filed Critical Tut Systems Inc
Application granted granted Critical
Publication of TWI223941B publication Critical patent/TWI223941B/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/33User authentication using certificates
    • G06F21/335User authentication using certificates for accessing specific resources, e.g. using Kerberos tickets
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

A system and method for managing network access. The method and system involve a policy server and a service gateway which send messages to one another via a user's network access application program. In one embodiment, the network access application program is an Internet web browser. The service gateway receives a network access request from a user and sends an authorization request message regarding the user to a policy server via the user's network application program. In one embodiment, the network access request is an Internet web site access request. The service gateway will then, if the policy server grants access, receive from the user's network access application program an authorization granted message regarding the user that was initiated by the policy server. The service gateway will then provide the user access to a network such as the Internet. The policy server receives an authorization request message from a user's network access application program that was initiated by the service gateway. The policy server processes payment information received from the user and, assuming that the payment information is sufficient, provides an authorization granted message regarding the user to the service gateway via the user's network access application program.

Description

五、發明說明(1) 相關專利 本專利是在2 0 0 0年1月13日所申請的美國案 60/177,187。 b 發明範圍 本發明係有關於管理網路接達的領域。更明確而言,本 發明係有關用以接收付款以提供接達例如網 路之系統及方法。 峪 發明背景 網際網路與個人電腦在目前的社會已普遍存在。雖然網 際網路以各種不同的形式存在已有許多年,但是網際網路 在使用全球資訊網的大眾傳播交通工具已變得相當流行。 從一使用者的展望,全球資訊網是容易確認一遠^電腦、 連接到遠端電腦、及可檢視在遠端電腦上所儲存資訊之方 法。 、。 當使用網際網時’隱藏在使用者背後是可進行網際網路 功能的各種不同通訊協定。各種不同的委員會與已知工作 群組的特別小組可協調及控制網際網路。在I n t e r n e t Engineering Task Force (IETF)下,工作小組可決定網 際網路的基本功能之規則與協定,並且將他們當作評論的 要求而出版,其普遍稱為RFCs °RFCs可在各種不同的網站 上可經由網際網路而完全使用。 網站是透過稱為一致性資源定位器(URL )的文字描述或 鲁 名稱所指定,其目前是透過一致性資源識別符(UR I )用語 所造成 。 (可上網http://www·rfc-editor·org/rfc/ 1223941 五、發明說明(2) ric2396.txt參考在1998年8月草擬標準RFC 2396,名稱 "Uniform Resource Identifiers (URI): Generic S,yn,taxn )。通常,資訊可在網際網路上經由使用者資料包 協定(UDP)、傳輸控制協定/網際網路協定(TCP/IP)、與可 在TCP上操作的超文字傳輸協定(HTTP)而通訊。更多的資 訊可參考下列··網站http://www.rfc-editor.org/rfc/ rfc768.txt ,在1980年8月28曰由J· Postel所發表的 "User Datagram Protocol11 RFC 76 8 ;網站 ht tp : "www. ietf.org/rfc/rfcll80.txt ,在1991 年1 月由 T· Socolofsky 與C· Kale 所發表 ^jnA TCP/IP Tutorial 丨丨 RFC 1180 ;及網站http://www· ietf.org/rfc/rfc2616.txt , 在1999年6月(草擬標準)由R. Fielding et al.所發表的 n Hypertext Transfer Protocol - HTTP/1.1 丨,RFC 2616 〇 當在網際網路上的全球資訊網使用增加時,高速網際網 路接達的要求便增加。雖然人與小企業可能想要較高速的 網際網路接達,但是複數個不願意支付與獲得一高速網際 網路連接有關的成本,例如,一電纜數據機、數位用戶線 (DSL)、T1線等。提供網際網路使用者在多占有者、多房 間或例如公寓、辦公大樓、宿舍房間等的公共建築物使用 高速網際網路接達的一方法是允許在一位置上的多位使用 者可共用一高速網際網路連接的接達。這些網際網路使用 者樂思及可提供網際網路接達的付款,特別是如果成本能 與使用相同高速接達方法的其他使用者分攤。5. Description of the invention (1) Related patents This patent was filed in the US case 60 / 177,187 filed on January 13, 2000. b Scope of the invention The present invention relates to the field of managing network access. More specifically, the present invention relates to systems and methods for receiving payments to provide access to, for example, a network.背景 BACKGROUND OF THE INVENTION The Internet and personal computers are prevalent in today's society. Although the Internet has existed in many different forms for many years, it has become quite popular for mass communication vehicles using the World Wide Web. From a user's perspective, the World Wide Web is a way to easily identify a remote computer, connect to a remote computer, and view the information stored on the remote computer. . When using the Internet, ‘hidden behind the user’ are the various protocols that can perform Internet functions. Various committees and ad hoc groups of known working groups coordinate and control the Internet. Under the Internet Engineering Task Force (IETF), the working group can determine the rules and protocols of the basic functions of the Internet and publish them as a request for comment. It is commonly known as RFCs. RFCs are available on various websites. The Internet is fully usable via the Internet. The website is specified by a textual description or name called a consistent resource locator (URL), which is currently caused by the term consistent resource identifier (UR I). (Available online http: // www · rfc-editor · org / rfc / 1223941 V. Description of the invention (2) ric2396.txt refers to the standard RFC 2396 drafted in August 1998, with the name " Uniform Resource Identifiers (URI): Generic S, yn, taxn). Generally, information can be communicated over the Internet via User Datagram Protocol (UDP), Transmission Control Protocol / Internet Protocol (TCP / IP), and Hypertext Transfer Protocol (HTTP), which operates over TCP. For more information, please refer to the following website: http://www.rfc-editor.org/rfc/ rfc768.txt, published on August 28, 1980 by J. Postel " User Datagram Protocol11 RFC 76 8 ; Website ht tp: " www. Ietf.org/rfc/rfcll80.txt, published by T. Socolofsky and C. Kale in January 1991 ^ jnA TCP / IP Tutorial 丨 丨 RFC 1180; and website http: / / www · ietf.org/rfc/rfc2616.txt, n Hypertext Transfer Protocol-HTTP / 1.1 published by R. Fielding et al. in June 1999 (draft standard), RFC 2616. When on the Internet As the use of the World Wide Web increases, so does the demand for high-speed Internet access. Although people and small businesses may want higher-speed Internet access, several are reluctant to pay the costs associated with obtaining a high-speed Internet connection, such as a cable modem, digital subscriber line (DSL), T1 Line etc. One way to provide Internet users with high-speed Internet access in multiple occupants, multiple rooms, or public buildings such as apartments, office buildings, dormitory rooms, etc. is to allow multiple users in a location to share Access to a high-speed internet connection. These Internet users are happy to think that they can provide Internet access payments, especially if the cost can be shared with other users using the same high-speed access method.

第8頁 A^394i 五、 發明說明(3) 此外,當電腦使用者歲 移動及旅行時,使用者I、I攜式電腦及其他個人計算裝置 ,路伺服器,從位在矩2能想要接達網路資源,例如網際 方氏餘。此外,例如旅餘他們的豕或辦公室的遠端’例如 用者暫時的網路接達。此 些位置可依需要提供一造訪使 ^網路網站伺服器,而且使用者可接達網路資源,例如網 腦使用者樂意及可提供输位置可提供此網路接達。這些電 們可補償他們的成本或利際網路接達的付款,而且只要他 際網路接達。 潤’該等位置便同樣樂意提供網 在各種不同的具體實施^ —多占有者、多房間建築你$ ’本發明的方法及系統允許 的高速接達提供給例如網、一擁有者或操作員可將共用 包括一策略伺服器及—二j路的一網路。該方法及系統 用者的網路接達應用程式二,器、,其可將訊息經由一使 ’網路接達應用程式是_ = f傳送。在一具體實施例中 ::從-使用者接收 '網路:達同=站劉覽器。服務間道 μ 授柘要求訊息經由使用者的細f,並且將有關使用者 ^略伺服器。在一具體實施例中、、應用程式而傳送給一 網路網站接達要求。如果,網路接達要求是一網際 3器f後便可從使用者的網路ί J 5器$許接達,服務開 二服器所開始的有關使用者之—ρ ,式接收透過策— 二閘道器可將使用者接達提供輅^萑4訊息。然後,月 朿略伺服器可從一使用者的^ 際網路的一網路,Page 8 A ^ 394i V. Description of the invention (3) In addition, when the computer user moves and travels, the user I, I portable computer and other personal computing devices, road servers, can be imagined from moment 2 To access network resources, such as Internet Fang Yu. In addition, such as travelling to their office or the remote end of the office, such as the user's temporary Internet access. These locations can provide a visit to the Internet web server as needed, and users can access network resources, such as Internet users who are willing and can provide input locations to provide this network access. They can compensate them for their costs or payments made via Internet access, as long as they have Internet access. Run 'these locations will be equally happy to provide the network in a variety of different implementations ^-multi-occupant, multi-room building you $' The method and system of the present invention allows high-speed access to be provided to, for example, the network, an owner or an operator The network can include a policy server and a network of two channels. The method and system uses a user's network access application program II, which can send messages through a network access application program which is _ = f. In a specific embodiment :: Receive from-user 'Network: Datong = Station Liu Lan. The service channel μ instructs the request message to pass through the user's details, and the server will be notified about the user. In a specific embodiment, the application program sends the request to an Internet website to receive the request. If the Internet access request is an Internet device, you can access it from the user ’s network, and the service is started by the relevant user—ρ. — Two gateways can provide user access with 辂 ^ 萑 4 messages. Then, the monthly strategy server can access a network from a user's Internet,

路接達應用程式接收可透S 第9頁 1223941 五、發明說明(4) 服務閘道器所開始的一授權要求訊息。該策略伺服器可處 理從使用者接收的付款資訊,而且假設付款資訊是充份的 、將有關使用者的一授權允許訊息經由使用者的網路接達 應用程式而提供給服務閘道器。 圖式之簡單說明 圖1係描述根據本發明的系統及方法之一具體實施例所 採行的流程。 圖2係描述本發明的一系統及方法之具體實施例的網路 結構。 圖3 A和3 B係描述根據本發明的系統及方法之一具體實施 例所採行一服務閘道器及一策略伺服器的動作流程。 發明之詳細說明 A.管理網際網路接達之一系統及方法 多高間中樣供 採上提 在各種不同的具體實施例中,本發明的方法及系統允許 占有者、多房間建築物的擁有者或一操作員可將共用的 速接達提供給例如網際網路的一網路。例如,在旅館房 的一客人可將一高速連接提供給網際網路。在另一範例 ,在一公寓或辦公大樓的一承租人可提供類似接達。同 地,在仍然是另一範例中,在一宿舍房間的一學生可提 類似接達。 圖1係描述根據本發明的系統及方法之一具體實施例所 行的流程。一客人、承租人等的使用者可在電腦、一膝 型電腦、桌上型電腦、個人計算裝置等插入一條線,以 供直接的網路接達,啟動電腦,並且開始例如一網際網Road access application receives transparent S Page 9 1223941 V. Description of the invention (4) An authorization request message started by the service gateway. The policy server can process the payment information received from the user, and assuming that the payment information is sufficient, an authorization permission message about the user is provided to the service gateway through the user's network access application. Brief Description of the Drawings Fig. 1 is a flow chart describing a specific embodiment of a system and method according to the present invention. FIG. 2 illustrates a network structure of a specific embodiment of a system and method of the present invention. Figures 3A and 3B describe the operation flow of a service gateway and a policy server according to one embodiment of the system and method according to the present invention. Detailed description of the invention A. A system and method for managing Internet access Multi-height and middle-scale samples are available for sampling In various specific embodiments, the method and system of the present invention allow occupants, multi-room buildings The owner or an operator can provide shared speed access to a network such as the Internet. For example, a guest in a hotel room can provide a high-speed connection to the Internet. In another example, a tenant in an apartment or office building can provide similar access. Similarly, in still another example, a student in a dormitory room may provide similar access. FIG. 1 is a flow chart describing a specific embodiment of a system and method according to the present invention. A user, renter, etc. can insert a line into a computer, laptop, desktop, personal computing device, etc. for direct network access, start the computer, and start, for example, the Internet

第10頁 吟蜗1站瀏覽器的 J體實施例中,如方3達應_用程式’以接達-網站。在一 t上出現的網站達要求。…使用者站的 :等所提供的一網頁=網頁,透過旅館、財產管理公 時段的網際網路接達从允許使用者同意支付某一 實施例中ΙΠί;時間為止。更明續而言, 站要求,而且者居住位置上的服務閘道器可攔截 ^ 而且如方塊4所+,π你 J J爛戴網 導向-策略飼服器,以致、τ將使用者的網瀏覽器重新 要求訊息傳送給一策略伺服:用ΐ的網劉覽器可將-授權 此網頁句人Μ A , 百晋水付款資訊與使用眘却 ,J Ζ包含桌略伺服器的隱藏參考,以 之用貝訊二 付二次用者輸入付款資訊與使用資訊時,』用去尤所不 伺m ΐ供給策略伺服器。位在網際網路遠:的!; ί: 許或拒絕使用者接達網際網路。 果使用者同意接受改變,並 所不 訊,策略伺服矸妗婼枯田徒供要求付款與使用資 所不朿略伺服器然後指示服務閛道器争 f塊10 新導向使用者的網瀏覽器而提供對透過重 此可透過策…器用以將傳 提供給服務開道器…,客人的訊息 j电細允&在授權時透過 1223941 五、發明說明(6) 服務閘道器而接達網際網路,例如直到退出、直到一指定 的日期與時間、及指定的天數或時數為止。然後,服務閘 道器可將接達的確認經由一網頁而提供給使用者,而且在 一具體實施例中,可提供一預設的開始網頁,而且在另一 具體實施例中,如方塊1 2所示,可將使用者的網瀏覽器重 新導向最初透過使用者要求的網站。 B.營理網際網路接達之一系統及方法的網路結構 圖2係描述本發明之一系統及方法的具體實施例之網路 結構。根據本發明的一具體實施例,系統及方法包括複數 個使用者電腦40,其中只描述3個,一集線器48、一策略 伺服器3 4、及一服務閘道器1 4。在一具體實施例中,一策 略伺服器3 4及一服務閘道器1 4是連接到網際網路5 0。此連 接可根據在技藝中技術的已知方法達成,其包括但是未侷 限在透過整合服務數位網路(I SDN )、數位用戶線(DSL)、 電纜數據機、T 1線、T 3線等的連接。在另一環境中,無線 通訊亦可使用。在另一具體實施例中,策略伺服器3 4與服 務閘道器1 4可藉由允許資料在他們之間通訊的電腦通訊而 彼此連接。此連接包括但是未局限在租線等。在一具體實 施例中,多重策略伺服器3 4與服務閘道器1 4可參與本發明 的方法,特別是當多重占有者的建築物是大的、及/或當 擁有居住的實體及擁有或租用擁有多重建築物或擁有地理 遠距離建築物的策略伺服器。此外,多重集線器4 8或例如 多工器、集中器等的類似裝置可連接到一或多個服務閘道 器0Page 10 In the J-body embodiment of the 1-site browser, Yin Fang Da Ying should use the program to access the website. The website that appeared on t met the requirements. … On the user's station: Waiting for a web page = web page provided, through Internet access in hotels, property management public time, from allowing users to agree to pay in certain embodiments; More specifically, the station is required, and the service gateway at the user's living location can intercept it ^ And as the block 4+, π you JJ bad wearing net-oriented-strategic feeder, so that τ will The browser re-requests the message to a strategy server: Use the web browser of the website to authorize this page sentence person M A, Bai Jinshui payment information and use with caution, J Z contains a hidden reference of the table server With the use of Bixun second-pay and second-time users to enter payment information and usage information, they are used to provide strategy servers. Located on the Internet: Yes! Ί: Allow or deny users access to the Internet. If the user agrees to accept the change, and the information is not provided, the strategy server will respond to the request for payment and use of the ignorant server and then instruct the service server to compete for block 10. A new web browser for users And to provide through the use of this strategy through the device to provide to the service opener ..., the customer's message j Dianyun & through authorization 12324941 V. Description of the invention (6) service gateway to the Internet Network, for example, until logout, until a specified date and time, and a specified number of days or hours. Then, the service gateway can provide the user with a confirmation of access via a webpage, and in a specific embodiment, can provide a preset start webpage, and in another specific embodiment, such as block 1 As shown in Figure 2, the user's web browser can be redirected to the website originally requested by the user. B. Network Structure of a System and Method for Internet Access Figure 2 is a network structure describing a specific embodiment of a system and method of the present invention. According to a specific embodiment of the present invention, the system and method include a plurality of user computers 40, of which only three are described, a hub 48, a strategy server 34, and a service gateway 14. In a specific embodiment, a policy server 34 and a service gateway 14 are connected to the Internet 50. This connection can be achieved in accordance with known methods of technology in the art, including but not limited to digital services via integrated services (I SDN), digital subscriber lines (DSL), cable modems, T 1 lines, T 3 lines, etc. Connection. Wireless communication can also be used in another environment. In another embodiment, the policy server 34 and the service gateway 14 can be connected to each other by a computer communication that allows data to be communicated between them. This connection includes but is not limited to leased lines. In a specific embodiment, the multi-strategy server 34 and the service gateway 14 can participate in the method of the present invention, especially when the multi-occupant building is large, and / or when the occupant entity and the owner have Or rent a strategy server with multiple buildings or geographically distant buildings. In addition, multiple hubs 48 or similar devices such as multiplexers, concentrators, etc. can be connected to one or more service gateways 0

第12頁Page 12

在一具體實施例中,兮士 務閘道器1 4儲存及執〜Μ方法能以透過策略伺服器3 4與服 閘道器1 4可以是任=的^體實施。策略伺服器3 4與服務 接達例如網際網路的,器電腦,以執行軟體程式,並且 閘道器1 4包含處理器^ =網路。在一具體實施例中,服務 電腦處理器,而且^己情^記憶體1 6。處理器1 5可以是任何 (RAM)、或其他可讀盘思體^6可以是任何隨意接達記憶體 處理器15可執行軟、體可,寫甘的記憶體裝置。In a specific embodiment, the storage and execution method of the server gateway 14 can be implemented by using the policy server 34 and the server gateway 14. The policy server 34 and services are connected to a computer such as the Internet to execute software programs, and the gateway 14 includes a processor ^ = network. In a specific embodiment, the computer processor is served and the memory 16 is stored. The processor 15 may be any (RAM) or other readable disks. The processor 15 may be any random access memory. The processor 15 may execute a soft, physical, and writeable memory device.

方法。包括實施本發明2可實施利用記憶體1 6的本發明 1 7,該磁碟機是耦合到徙的軟體資訊可讀及寫到磁碟機 硬碟機、一可讀與可京碟控制器18。磁碟機17可以是一 狀物或卡片記憶體裝&j碟(cyw)機、一軟碟機、一棒 處理器的任何其他機器妹數位聲曰4 f(DAT)機等、或 任何方法而連接。處^ 二媒體、及透過一網路或通訊的 以在在顯示裝置2 2上· ^ 1將指令與顯示控制器2 〇通訊, 顯示控制器,而且顯示梦、=像。顯示控制器2〇可以是任何 括但是未侷限在一陰極^ 可以是任何顯示監視器,包 電晶體(TFT)顯示螢幕。、、、WCRT)顯示監視器、或薄膜 由任何電腦輸入裝置而接、統官理者或其他類似的人可經 輸入/輸出控制器2 8而叙入付款系統祠服器1 4,例如透過 服務閘道器14亦包括絪"到處理器的鍵盤24與滑鼠26。method. The invention includes the invention 1 7 which can implement the invention 2 and the memory 16 which can be implemented. The magnetic disk drive is coupled to the migrating software information readable and written to the magnetic disk hard disk drive, and a readable and accessible Beijing disk controller 18. The magnetic disk drive 17 may be an object or a card memory device, a CD drive (cyw) machine, a floppy disk drive, a stick processor, any other machine, a digital 4F (DAT) machine, etc., or any Method instead. ^ ^ Two media, and through a network or communication to display commands on the display device 2 2 ^ 1 to communicate with the display controller 2 0, display controller, and display dream, = image. The display controller 20 can be any but not limited to a cathode ^ It can be any display monitor, including a transistor (TFT) display screen. (,,, WCRT) display monitors, or films connected by any computer input device, administrators or other similar people can enter the payment system server 1 4 through the input / output controller 28, for example through The service gateway 14 also includes a keyboard 24 and a mouse 26 to the processor.

務閘道器1 4能與一網路、介面3 0。在此具體實施例,服 施例中的網際網路5 0通却一廣域網路通訊、或在一具體實 機、一電纜數據機、一 ^三網路介面3 〇可以是一數位數據 G太網路卡片、或任何其他類型的The gateway 14 can communicate with a network and interface 30. In this specific embodiment, the Internet 50 in the embodiment can communicate with a wide area network, or a specific physical machine, a cable modem, and a three-network interface 3 can be a digital data G too. Network card, or any other type

1223941 五、發明說明 7 =接達裝置,其允許經由一數位用戶線(DSL)、有線電 t = : T 1線、T 3線、或可在一網路上資訊通信的任何其他 南迷專屬線而連接到網際網路5 0。在另—環境中,無線通 訊亦可使用。處理器1 5、記憶體1 6、磁碟控制器丨8 了顯示 控制器20、輸入/輸出控制器28、與網路介面3〇可經由匯 版排3 2而彼此耦合’及在匯流排3 2上彼此通訊。匯流排3 2 了以疋在一電腦内的元件之間提供通訊的任何匯流排。雖 然只描述一匯流排’但是多重匯流排可使用在服務閘道器 1 4 °此外,描述的元件與控制器的其他元件與控制器(未 在圖中描述)、或多重例證可包括在服務閘道器丨4。在一 具體實施例中’服務閘道器1 4可在網際網路上經由網路介 ,3 0而通訊’並且從連接到例如策略伺服器3 4與網站伺服 器(未在圖中顯示)的網路的裝置接收資訊及通訊。 在一具體實施例中,服務閘道器丨4、策略伺服器3 4、與 使用者電腦4 0之其中每一者包括可在網際網路5〇上通訊的 軟體。在一具體實施例中,此包括允許經由超文字傳輸協 定(HTTP)、使用者資料包協定(UDp)、傳輸連接協定/網際 網路協定(TCP/IP)、及其他網路通訊協定而提供通訊的軟 體。 雖然只描述一服務閘道器1 4,但是實施本發明服務閘道 器的一系統可包含能一區域網路(UN)、成串、成群、子 網路等(未在圖中顯示)配置的多重電腦。在一具體實施例 中’一群、成串、區域網路、子網路等形成的此系統可經 由一或多個防火牆或其他安全裝置與系統而連接到網際網1223941 V. Description of the invention 7 = Access device, which allows via a digital subscriber line (DSL), cable t =: T 1 line, T 3 line, or any other Nanmi exclusive line that can communicate information on a network And connected to the Internet 5 0. In another environment, wireless communication can also be used. The processor 15, the memory 16, the disk controller, the display controller 20, the input / output controller 28, and the network interface 30 can be coupled to each other via the busbar 32, and the busbar Communicate with each other on 3 2. A bus 3 2 is any bus that provides communication between components in a computer. Although only one bus is described, multiple buses can be used in the service gateway 14 °. In addition, the described components and other components and controllers of the controller (not shown in the figure), or multiple instances can be included in the service. Gateway 丨 4. In a specific embodiment, the 'service gateway 14 can communicate over the Internet via a network interface, 30' and from a connection to, for example, a policy server 34 and a web server (not shown in the figure) Network devices receive information and communications. In a specific embodiment, each of the service gateway 4, the policy server 34, and the user computer 40 includes software that can communicate over the Internet 50. In a specific embodiment, this includes allowing provision via Hypertext Transfer Protocol (HTTP), User Datagram Protocol (UDp), Transport Connection Protocol / Internet Protocol (TCP / IP), and other network communication protocols. Communication software. Although only one service gateway 14 is described, a system implementing the service gateway of the present invention may include a local area network (UN), string, cluster, subnet, etc. (not shown in the figure) Multiple computers configured. In a specific embodiment, the system formed by a group, string, local area network, subnet, etc. may be connected to the Internet via one or more firewalls or other security devices and systems.

第14頁Page 14

路、或复仙入 % 網際網i 全球通訊網路’所以飼服器為了安全目的可從 用伺服哭及其他電腦分開。此系統可包含繪圖伺服器、應 雖然二丄及其他特殊專屬伺服器(未在圖中顯示)。Road, or Fuxian access% Internet i Global Communications Network ’so the feeder can be separated from the server and other computers for security purposes. This system may include a drawing server, an application server, and other special dedicated servers (not shown in the figure).

器的1、糸、邊述一策略伺服器3 4,但是實施本發明策略伺服 路等(夫、/統可包含一區域網路(LAN)、成串、成群、子網 例中,一、圖中顯示)任何形式的多重電腦。在一具體實施 統可經ώ群、、成串、區域網路、子網路等形式配置的此系 網際網敗—或多個防火牆或其他安全裝置與系統而連接到 器可炉4或其他全球通訊網路,所以為了安全目的,伺服 服哭Γ f際網路及其他電腦分開。此系統可包含特繪圖伺 Μ用伺服器及其他特殊化專屬伺服器(未在圖中顯 徵的用者電腦4 0可以是具有類似服務閘道器14的元件與特 人1,何個人電腦有。此外’使用者電腦4 〇可以是任何個 包°异裝置,以執行程式及接達例如網際網路的一網路, t括彳旦是未局限在細胞式電話、個人數位輔助器、桌上型 ^電腦、可攜式電腦、電腦寫字板、電腦耳機、膝上型 電腦、電腦工作站等。 4 4要接達服務閘道器1 4,使用者電腦4 0可執行例如網際1, 1, and a policy server 3 4 are described, but the implementation of the policy server of the present invention, etc. (the husband and wife can include a local area network (LAN), string, cluster, subnet example, one (Shown in the figure) any kind of multiple computers. In a specific implementation, this system can be configured via a group, a string, a local area network, a subnet, etc.—or multiple firewalls or other security devices and systems connected to the appliance 4 or other The global communication network, so for security purposes, the server is separated from other computers. This system may include a special drawing server and other special dedicated servers (the user computer 40 not shown in the figure may be a component with a similar service gateway 14 and a special person 1, or a personal computer) Yes. In addition, the user's computer 40 can be any external device to execute programs and access a network such as the Internet. It is not limited to cell phones, personal digital assistants, Desktop ^ computer, portable computer, computer tablet, computer headset, laptop, computer workstation, etc. 4 4 To access the service gateway 1 4, the user computer 40 can perform, for example, the Internet

$路網站瀏覽軟體的一網路接達應用程式,除了允許接達 如上述的網際網路之外,一範例是可從美國加州Μ 〇 u n t a i η /ew 市的 Netscape Communicator® 公司獲得的Netscape 通 訊軟體。 C· 閘道器及一 Μ略伺服器的功能A network access application of the $ Road website browsing software, in addition to allowing access to the Internet as described above, an example is Netscape communications available from Netscape Communicator®, Inc. of California, USA. software. C. Gateway and a server function

第15頁 1223941 五、發明說明(ίο) 圖3A和3B係描述根據本發明的系統及方法之一具體實施 例所採行的一服務閘道器及一策略伺服器之動作流程。只 要電源啟動,一服務閘道器便可如方塊5 2所示將所有的連 接埠設定成一未授權狀態。此狀態是表示經由連接埠而連 接的計算裝置可不經授權而接達網際網路。如此,服務閘 道器可透過經由連接埠連接的計算裝置而禁止網際網路接 達,此是在未授權狀態。在一具體實施例中,只要電源啟 動,服務閘道器可諮詢它本身的内部資料庫,及在認可狀 態放置具有殘留時間或未到達一同意屆滿日期與時間的這 些連接埠。然後,如方塊5 4所示,服務閘道器可在一連接 埠上從一使用者接收一網站接達要求。在一具體實施例中 ,此要求是指定一網站的URL·。如果接收網站接達要求的 連接埠是在未授權狀態,服務閘道器可產生一授權要求訊 息(AR - MSG),並且將一重新導向指令傳送給使用者,用以 將使用者的網瀏覽器重新導向,以便如方塊5 6所示而將 AR-MSG傳送給一策略伺服器。在一具體實施例中,重新導 ifp令是一URL形式’其包含重新導向策略伺服器的- 朽服哭ΐ ΐ亦包括當作關鍵字的AR_MSG欄位。指定的策略 過服務閘道器的建構、特殊接達連接棒、各種 不^滚略伺服器的目前負荷、或其他因素而決定:分 朿略伺服器可如方塊58所示接eAR—MSG、 且用者?求付款資訊與使用資訊。在一;例f 與ί用2 ί益I將一網頁提供給使用者,以要求付款資訊 、吏用貝訊》在此具體實施例中,當使用者使經由網頁提Page 15 1223941 V. Description of the invention (ίο) Figures 3A and 3B describe the operation flow of a service gateway and a policy server adopted by a specific embodiment of the system and method according to the present invention. As long as the power is turned on, a service gateway can set all the ports to an unauthorized state as shown in block 5 2. This status indicates that a computing device connected via the port can access the Internet without authorization. In this way, the service gateway can disable Internet access through a computing device connected via a port, which is in an unauthorized state. In a specific embodiment, as long as the power is turned on, the service gateway may consult its own internal database and place these ports in the approved state with a residual time or not reaching a consent expiration date and time. Then, as indicated by block 54, the service gateway may receive a website access request from a user on a port. In a specific embodiment, the requirement is to specify the URL of a website. If the port receiving the website access request is in an unauthorized state, the service gateway can generate an authorization request message (AR-MSG) and send a redirection command to the user to browse the user's web browser. The server redirects to transmit the AR-MSG to a policy server as shown in block 56. In a specific embodiment, the redirect ifp command is in the form of a URL, which includes the redirection policy server's-cricket service ΐ ΐ also includes the AR_MSG field as a keyword. The specified strategy is determined by the construction of the service gateway, the special access connection bar, the current load of various non-rolling servers, or other factors: the branching server can be connected to eAR-MSG as shown in block 58, And who? Find payment information and usage information. In one example, f and I use 2 to provide a web page to the user to request payment information. In this specific embodiment, when the user makes a request via the web page,

1223941 五、發明說明(π) 供此資訊時,付款資訊與使用資訊將可傳送給策略伺服器 。在一具體實施例中,付款資訊與使用資訊能以編碼格2 而從使用者傳送給策略伺服器,例如根據經由使用者的^ 瀏覽器所提供的第二封包層(SSL)編碼與傳輸層安全、 。在SSL上的更多資訊可從美國加州Mountain View市的 Netscape Communications公司獲得,而且有關TLS的額夕卜 資訊可參考網站http://www· ietf.org/rfc/rfc2818·txt 在 2000 年5 月由 Ε· Rescoria 所發表的’· HTTP Over ΤΤ.ς» RFC 2818獲得。策略服伺者然後可從使用者接收付款資訊 與使用資訊,而且如方塊59所示可處理AR-MSG、付款資訊 與使用資訊。 . 根據此處理,策略伺服器然後可如方塊6 〇所示決定授^ 接達網際網路是否應該允許。策略伺服器可決定使用此一 内部策略資料庫。策略資料庫的結構可以是儲存、取回, 及,持處理AR-MSG所需資訊之其中任何方式方法。在一 ^ 體實施例中,策略伺服器能與信用卡處理公司、財務機名 、或其他類似實體相通訊,以確認付款資訊是正確,不』 ^泎及/或有充份的基金或信用。在各種不同的具體實施 =中,此可包括諮詢由第三者電腦通訊内部所維護及/或 接達清單的策略伺服器。 如果策略伺服器 塊6 2所示而將一接 者的連接埠初始化 可傳送給服務閘道 不允許使用者授權 達拒絕的網頁傳送 成未經授權接達網 器。如果授權透過 ,策略伺服器可如方 給使使用者。當使用 際網路時,沒有訊息 策略伺服器允許,策1223941 V. Description of invention (π) When this information is provided, payment information and usage information will be transmitted to the policy server. In a specific embodiment, the payment information and the usage information can be transmitted from the user to the policy server in the encoding box 2, for example, according to the second packet layer (SSL) encoding and transmission layer provided by the user's browser. Safety, . More information on SSL can be obtained from Netscape Communications of Mountain View, California, and information on TLS can be found on the website http: // www · ietf.org/rfc/rfc2818·txt in May 2000 The month was obtained by '· HTTP Over ΤΤ.ς »RFC 2818 published by E. Rescoria. The strategy server can then receive payment information and usage information from the user, and can process AR-MSG, payment information, and usage information as shown in block 59. Based on this process, the policy server may then decide, as shown in block 60, whether the granting of access to the Internet should be allowed. The policy server may decide to use this internal policy database. The structure of the strategy database can be any of the methods of storing, retrieving, and holding the information needed to process the AR-MSG. In one embodiment, the policy server can communicate with a credit card processing company, financial machine name, or other similar entity to confirm that the payment information is correct, no "and / or have sufficient funds or credit. In various implementations, this may include consulting a policy server maintained and / or accessible by a third party computer communications internally. If the policy server initializes the port of a receiver as shown in block 62, it can be transmitted to the service gateway. The user's authorization is not allowed. The rejected web page is transmitted to the unauthorized access network. If authorized to pass, the policy server can give users such a way. When using the Internet, there is no message

第17頁 1223941 五、發明說明(12) 略伺服器便產生一授權允許訊息(AG-MSG),而且在一具體 實施例中,將一重新導向指令傳送給使用者的網站瀏覽器 ,以便如方塊64所示而將AG-MSG傳送給服務閘道器。此重 新導向指令可已是包括當作關鍵字的AG-MSG欄位的一URL 形式。在另一具體實施例中,策略伺服器可經由使用者的 網站瀏覽器而將一網頁提供給使用者,該網站瀏覽器具有 一HTML連結,其可指向包含AG-MSG的服務閘道器。例如, 使用者可使用描述n Click Here To Access the Internet"的一網頁提供。當使用者按一下或啟動與此網 頁有關的連結時,使用者的瀏覽器可將AG-MSG傳送給服務 閘道器。在這些具體實施例之其中任何一者,使用者不是 秘密採行的一連串事件與動作。如方塊6 6所示,然後,服 務閘道器可從使用者(使用者未知)接收AG-MSG、確認訊息 、並且將使用者的連接埠轉變成授權狀態。 如方塊68所示,在接收AG-MSG之後,服務閘道器可提供 一歡迎網頁,並且在短時間顯示歡迎網頁之後,亦可提供 透過使用者最初所要求的網頁。如方塊7 0所示,服務閘道 器然後可將網際網路接達提供給使用者。在一具體實施例 中,服務閘道器亦可充當一防火牆,以避免不必要接達使 用者電腦。如方塊7 2所示,服務閘道器可週期性檢查,以 決定使用者所允許的授權是否屆滿。如方塊7 0所示,如果 授權未屆滿,服務閘道器可持續提供使用者的網際網路接 達。如果使用者的授權屆滿,例如當使用者退出一旅館房 間,當一使用者指定的使用時數屆滿、或當一使用者指定Page 17 1223941 V. Description of the invention (12) The server generates an authorization permission message (AG-MSG), and in a specific embodiment, sends a redirection instruction to the user's web browser so that The block 64 transmits the AG-MSG to the serving gateway. This redirection instruction may already be in the form of a URL including the AG-MSG field as a keyword. In another specific embodiment, the policy server can provide a web page to the user via the user's web browser. The web browser has an HTML link that can point to a service gateway containing AG-MSG. For example, a user may provide it using a webpage that describes n Click Here To Access the Internet ". When the user clicks or activates the link related to this webpage, the user's browser can send the AG-MSG to the service gateway. In any of these embodiments, the user is not a series of events and actions taken in secret. As shown in block 66, the server gateway can then receive the AG-MSG from the user (user unknown), confirm the message, and change the user's port into an authorized state. As shown in block 68, after receiving the AG-MSG, the service gateway can provide a welcome page, and after displaying the welcome page for a short time, it can also provide the page originally requested by the user. As shown in block 70, the service gateway can then provide Internet access to the user. In a specific embodiment, the service gateway can also act as a firewall to avoid unnecessary access to the user's computer. As shown in block 72, the service gateway may periodically check to determine whether the authorization allowed by the user has expired. As shown in block 70, the service gateway can continuously provide the user's Internet access if the authorization has not expired. If the user's authorization expires, such as when the user exits a hotel room, when a user specifies the number of uses, or when a user specifies

第18頁 1223941 五、發明說明(13) 結束日期與時間到達時,服務閘道器便可將一接達屆滿的 網頁傳送給使用者,並且將使用者的連接埠設定成未授權 狀態,所以透過使用者的進一步網際網路接達可如方塊74 所示而由服務閘道器所拒絕。 參 在一具體實施例中,系統及方法可藉由Η T T P訊息的傳送 而整個操作。雖然AR-MSG是透過服務閘道器開始,I且由 策略伺服器接收,而且雖然AG-MSG是透過策略伺服器開始 ,並且由服務閘道器接收,在策略伺服器與服務閘道器之 間並未描述直接通訊。如上面討論的這些訊息可經由一使 用者電腦的網瀏覽器傳送。Page 18 1223941 V. Description of the invention (13) When the end date and time arrive, the service gateway can send a web page that has expired to the user and set the user's port to an unauthorized state, so Further Internet access through the user may be rejected by the service gateway as shown in block 74. In a specific embodiment, the system and method can be operated entirely by the transmission of a TTP message. Although the AR-MSG starts through the service gateway and is received by the policy server, and although the AG-MSG starts through the policy server and is received by the service gateway, between the policy server and the service gateway No direct communication was described. These messages, as discussed above, can be transmitted via a web browser on the user's computer.

既然所有的通訊可透過用戶端的瀏覽器傳送,所以每個 訊息可由使用者看見及修改。例如,使用者可嘗試透過將 一欺詐授權允許訊息傳遞給服務閘道器而獲得網路接達, 而無需包括策略伺服器。若要保護受此類型的攻擊,在一 具體實施例中,透過策略伺服器與服務閘道器所產生及通 訊的每個訊息可包含一訊息摘要5 (MD5)數位簽字,並且 可結合一共用秘密。訊息的確認可透過檢查在訊息接收上 的簽字而達成。有關MD5的額外資訊可在網站http://www. ietf·org/rfc/rfcl321·txt 由R· Rivest 在1992 年4 月的 ,f The MD 5 Message - Digest Algorithmn RFC 1321 中獲得 。共用秘密只由策略伺服器與閘道器伺服器知道,而且使 用者無需知道。如此,使用者將不能產生欺詐訊息。同樣 地,若要避免一不守規矩使用者重複或複製先前有效接收 的一有效訊息,每個訊息可包含一任意序號’如果重複,Since all communication can be transmitted through the browser of the client, each message can be seen and modified by the user. For example, a user may attempt to gain network access by passing a fraudulent authorization permission message to the service gateway without including a policy server. To protect against this type of attack, in a specific embodiment, each message generated and communicated through the policy server and service gateway can include a message digest 5 (MD5) digital signature, and can be combined with a shared secret. Confirmation of the message can be achieved by checking the signature on the message received. Additional information on MD5 is available at the website http: //www.ietf·org/rfc/rfcl321·txt by R · Rivest in April 1992, f The MD 5 Message-Digest Algorithmn RFC 1321. The shared secret is known only by the policy server and the gateway server, and the user does not need to know it. In this way, users will not be able to generate fraudulent messages. Similarly, to prevent an unruly user from repeating or copying a valid message previously validly received, each message may contain an arbitrary sequence number. 'If repeated,

第19頁 上223941 五、發明說明(14) 仏查序號是部分的訊息 將造成訊息被服務閘道器所忽略 確認。 在一具體實施例 為經認可與未經授 中,在未授權狀態 際網路接達。在授 所連接的一電腦允 施例中,每個邏輯 策略伺服器接收一 狀態。當授權屆滿 、當一系統操作員 便回到未授權狀態 在一具體實施例 何一或兩者能以使 號。RADIUS可透過 的網際網路接達而 管理資訊。服務閘 ,包括裝態資訊、 滿資訊、使用者識 用,以管理允許接 達的有關使用者的 ’用以獲得、處理 RADIUS的資訊可在 中’在服務閘道器, 權的兩狀態之其中— 而經由連接埠所連接 權狀態中,在未授權 許無限制的網際網路 連接埠可初始化成未 有效的允許訊息,一 時、當使用者中斷與 介入而且只要重新初 〇 中,策略伺服器與服 用者服務(RADIUS)協 服務閘道器使用,以 確認及維持該等連接 道器可維持有關每個 例如屆滿的殘留時間 別資訊等。RADIUS可 達及服務閘道器提供 貢訊。此外’策略飼 、及維持付款資訊與 網站http://www. iet 每個連接埠是指定 者。在未授權狀態 的一電腦只允許網 狀態而經由連接蟑 接達。在一具體實 授權狀態。只要從 連接埠便進入授權 服務閘道器連接時 始化,邏輯連接崞 務閘道器之其中任 定實施遠端認可撥 便藉由使用者允許 埠之其中每一者的 邏輯連接埠的資訊 或日期與時間的屆 透過策略伺服器始 使用者網際網路接 服器可使用RADIUS 使用資訊。有關 f.org/rfc/223941 on page 19 V. Description of the invention (14) Checking the serial number is part of the message will cause the message to be ignored by the service gateway for confirmation. In a specific embodiment, authorized and unauthorized, Internet access is in an unauthorized state. In a computer-enabled embodiment that is connected, each logical policy server receives a status. When the authorization expires, when a system operator returns to an unauthorized state, in one embodiment, one or both can be used. RADIUS can manage information through Internet access. Service gateway, including status information, full information, and user identification, to manage the access to relevant users' 'use to obtain and process RADIUS information can be in' in the service gateway, the two states of the right Among them, and in the state of the right of connection via the port, the unrestricted Internet port can be initialized to an invalid permission message at one time, when the user interrupts and intervenes and only needs to restart the middle school, the policy server Device and the user service (RADIUS) co-service gateways are used to confirm and maintain that these connecting devices can maintain information about each such as the expired residual time. RADIUS can provide tributes to service gateways. In addition, ‘strategy feed’, and maintain payment information and website http: // www. Iet Each port is designated. A computer in the unauthorized state is only allowed to access the network through the connection. In a concrete authorization state. As long as you enter the authorized service gateway from the port, it is initialized at the time of connection. Any one of the logically connected service gateways implements remotely authorized dialing. The user allows the logical port information of each of the ports. Or the user of the Internet server through the policy server can use RADIUS usage information through the policy server. About f.org/rfc/

rfc2865.txt 在 2000 年6 月由 C· Rigney, etal·所發表的rfc2865.txt was published by C · Rigney, etal · in June 2000

第20頁 1223941 五、發明說明(15) ,'B^ino^_Authent icat ion D^j a ] Tn User Service RFC 2865 中獲得。 D· 要求訊息 一AR-MSG可透過代表要求網際網路接達的使用者的服務 閘道器所產生。在一具體實施例中,AR-MSG與構成AR-MSG 的URL字串可包括下列一些或所有的欄位/關鍵字:一連接 ,識別符("port”)、一主機識別符(” host”)、一mac位址 (mac’)、一 開始的URL 指示(norigUri”)、一序號("seq") 、一數位簽字("s i gπ )、與一版本編號(” v e Γ ”)。 在一具體實施例中,一URL字串形式的AR-MSG包括連接 埠’使用者可藉由該連接埠而連接到一服務閘道器,如美 國為Λ父換標準碼(ASCII)格式的一文數字棚位的描述。 此價的設定可表示實體或邏輯接達連接埠是否透過使用者 連接到服務閘道器。只要連接到服務閘道器的特別連接蜂 是唯一的,連接埠識別符便能以任何形式指定。例如,如 果一服務閘道器具有邏輯或實體連接到數個接達集中器f 而且一使用者是連接到連接埠5,下列便可編碼: nport = switch3一port5",以表示它是第三集中器的第五連 接埠。在另一具體實施例中,如果連接埠值是未知,它便 可從訊息完全省略。 在一具體實施例中,一主機可使用文字名稱或一丨p位址 描述,它是由包含一 AR-MSG的URL字串中的ASCII字元戶斤矣且 成。指定的主機名稱或I P位址是服務閘道器的名稱或位址 。如果服務閘道器是多重定址,此意謂它具有超過_丨p位Page 20 1223941 V. Description of the invention (15), 'B ^ ino ^ _Authentic cation D ^ j a] Tn User Service RFC 2865. D. Request message An AR-MSG can be generated through a service gateway that represents the user requesting Internet access. In a specific embodiment, the AR-MSG and the URL string constituting the AR-MSG may include some or all of the following fields / keywords: a connection, an identifier (" port "), and a host identifier (" host "), a mac address (mac '), the initial URL indication (norigUri"), a serial number (" seq "), a digital signature (" si gπ), and a version number ("ve Γ "). In a specific embodiment, an AR-MSG in the form of a URL string includes a port. A user can connect to a service gateway through the port. For example, in the United States, the standard is ASCII format. A description of a digital booth. This price setting can indicate whether the physical or logical access port is connected to the service gateway through the user. The port identifier can be specified in any form as long as the special connection bee connected to the service gateway is unique. For example, if a service gateway has a logical or physical connection to several access concentrators f and a user is connected to port 5, the following can be coded: nport = switch3-port5 " to indicate that it is the third The fifth port of the concentrator. In another embodiment, if the port value is unknown, it can be completely omitted from the message. In a specific embodiment, a host may use a text name or a p address description, which is composed of ASCII characters in a URL string including an AR-MSG. The specified host name or IP address is the name or address of the service gateway. If the service gateway is multi-addressed, this means that it has more than _ 丨 p bits

第21頁 1223941 五、發明說明(16) 址,在主機值中所供應的I P位址必須是透過使用者可到達 的位址。在文字中的一主機識別符範例是 ”’host’ =sg3-mainstreet.hotel.isp.netπ ,而且當一IP 位址是n ’ h 〇 s t ’ = 1 9 2 · 2 3 · 1 2 · 3 π 。Page 21 1223941 V. Description of the invention (16) The IP address supplied in the host value must be an address reachable by the user. An example of a host identifier in the text is "'host' = sg3-mainstreet.hotel.isp.netπ, and when an IP address is n'h 〇st '= 1 9 2 · 2 3 · 1 2 · 3 π.

在一具體實施例中,包含一 AR-MSG的URL字串的π mac π攔 位可參考為使用者網路連接節點的電機與電子工程師協會 (IEEE) 8 0 2媒體接達控制(” MAC")硬體位址。通常,IEEE 8 0 2稱為乙太網路標準。在其他的具體實施例中,其他實 體節點位址可使用。在另一具體實施例中,如果"mac”位 址是未知,它便可從訊息省略。在一具體實施例中,在重 新導向之前,使用者指定的最初n urln是放置在由ASCI I字 元所組成的一欄位,其可命名為"or i gur 1 π ,例如 π origurl=http://www· uspto.gov'丨 ° 在一具體實施例中,服務閘道器可提供一 6 4位元非重複 序號,當作以一AR-MSG所組成URL字串的一欄位。只要系 統初始化成一任意值,序號便設定,如此不會從較早的初 始化與使用而重複。在一具體實施例中,序號可在指定為 n seqn的一欄位中提供,而且能以一1 6個位元組的ASCI I十 六進位值編碼,其表示以十六進位表示8個二進位值,例 如,丨丨 seq = 002d41e465 0 000219d4en 〇In a specific embodiment, the π mac π block of an AR-MSG URL string can be referred to the Institute of Electrical and Electronics Engineers (IEEE) 802 Media Access Control ("MAC ") Hardware address. Generally, IEEE 802 is called the Ethernet standard. In other specific embodiments, other physical node addresses can be used. In another specific embodiment, if the " mac "bit The address is unknown and it can be omitted from the message. In a specific embodiment, before the redirection, the initial n urln specified by the user is placed in a field consisting of ASCI I characters, which can be named " or i gur 1 π, such as π origurl = http: // www · uspto.gov '丨 ° In a specific embodiment, the service gateway can provide a 64-bit non-repeating serial number as a field of a URL string formed by an AR-MSG . As long as the system is initialized to an arbitrary value, the serial number is set so that it will not be repeated from earlier initialization and use. In a specific embodiment, the serial number can be provided in a field designated as n seqn, and can be encoded with a 16-byte ASCI I hexadecimal value, which indicates that the hexadecimal represents 8 two Carry value, for example, 丨 丨 seq = 002d41e465 0 000219d4en 〇

在一具體實施例中,包含一 AR-MSG的URL字串可包括一 MD5數位簽字,其可透過使用第一關鍵字開始的ar-MSG URL·串起而計算,省略在共用秘密後面的簽字參數(亦即, 在一具體實施例中,關鍵字n s i g"及其參數)。即是, 1223941 五、發明說明(17) n sign =MD5 (訊息+共用秘密),其中,,+”表示串接。 在一具體實施例中,服務閘道器可在URL中提供一協定 版本值。在一具體實施例中,版本可透過以ASCII十進位 的的一數值序列後面的n v e r,,而指定,例如,,v e r = 0 ',。 包括在一具體實施例中的一描述、編碼、與大小的 AR-MSG關鍵字摘要是在表1中描述。 關鍵字 描述 編碼 大小(位元組) “port” 邏輯接達連接埠位址 ASCII 可變 “ver” 協定版本 ASCII十進位 可變 “host” 訊息發起者的領域名稱 ASCII 可變 “mac” 用戶端的“MAC”位址 ASCII十六進位 12 “origurl” URL -在重新導向策略伺服器 在之前所指定的使用者 ASCII 可變 “seq” 有關此要求的序號 ASCII十六進位 16 “sig,, MD5簽字 ASCII十六進位 16 虹AR-MSG關鍵字In a specific embodiment, the URL string containing an AR-MSG may include an MD5 digital signature, which can be calculated by using the ar-MSG URL starting with the first keyword, strung, omitting the signature behind the shared secret Parameters (ie, in a specific embodiment, the keyword nsi g " and its parameters). That is, 1223941 V. Description of the invention (17) n sign = MD5 (message + shared secret), where “+” means concatenation. In a specific embodiment, the service gateway can provide a protocol version in the URL. Value. In a specific embodiment, the version can be specified by nver followed by a sequence of values in ASCII decimal, for example, ver = 0 '. A description, encoding included in a specific embodiment The size and size of the AR-MSG keyword summary are described in Table 1. Keyword description encoding size (bytes) "port" logical access port address ASCII variable "ver" protocol version ASCII decimal variable "Host" Message originator's domain name ASCII variable "mac" Client's "MAC" address ASCII hexadecimal 12 "origurl" URL-User redirected ASCII variable "seq" specified in the redirect policy server "ASCII Hexadecimal 16 about this requirement" sig ,, MD5 signature ASCII Hexadecimal 16 Rainbow AR-MSG keyword

在一具體實施例中,透過服務閘道器所準備與導向策略 伺服器的AR-MSG訊息可以是一URL詢問的形式,而且格式 如下所示·· http://hostname?kevwordl=valuel&kevword2 = value2&kevword3 = value3. · · kevwordN = va 1 ueN E· l權允許訊息In a specific embodiment, the AR-MSG message prepared through the service gateway and directed to the policy server may be in the form of a URL query, and the format is as follows: http: // hostname? Kevwordl = valuel & kevword2 = value2 & kevword3 = value3. kevwordN = va 1 ueN E

第23頁 1223941 五、發明說明(18) 允= :,一AG_MSG可透過策略祠服器產生, i = 路接達,並且傳送給連接到服務問道 自φ所扣…认^拔*收一AG_MSG,服務閘道器便可將在訊 二I所心疋的連接埠狀態轉變成授權狀態。在一具體實施 ,策略飼服器可將一AG-MSG經由使用者的網站劉 而傳送給服務閘道器。在如此做方面, 字串與使用者通訊,該URL字串包含由一AG_MSG所組成 的貝讯。在此URL子串中,一目的地服務閘道器是視為一 對應AR-MSG的發起者。 在一具體貫施例中,AG-MSG及達成_AG一MSG傳送的URL 子串可一些或所有的下列關鍵字/搁位:一主機識別符 (h 〇 s t ’)、一序唬(’’ s e q")、一數位簽字("s丨g")、版本編 號(n v e rπ )、一時間值(π ί 1 m e π )、一使用者識別符("土 d „ ) 、一最大資料率參數亦可視為頻寬、及一目的地URL (丨丨ur i丨丨 在一具體貫施例中’服務閘道器可從一徒用者接收舍作 一URL字串的AG-MSG ’其是透過一策略词服器初始化。服 務閘道器可確認包含一 AR-MSG的URL字串的簽字(” sig,,)欄 位值,在一具體實施例中’計算在第一關鍵字開始的接收 訊息上雜湊的一 M D 5,而且附加到在主機欄位(” h 〇 s tπ )中 所指定主機名稱的適當共用秘密。即是,MD5 (訊息+共用 秘密),其中π +π表示串接。除了確認簽字的有效性之外, 服務閘道器亦可確認在包含一 AG-MSG的URL字串中的一序 號(n s e qπ ),以確保它可符合一較早傳送A R - M S G的序號。Page 231223941 V. Description of the invention (18) Yun =:, an AG_MSG can be generated through the strategy server, i = road access, and transmitted to the service to ask for deduction from φ ... recognize ^ unplug * receive one AG_MSG, the service gateway can change the state of the port in the heart of the message to the authorized state. In a specific implementation, the strategic feeder can transmit an AG-MSG to the service gateway via the user's website Liu. In doing so, the string communicates with the user, and the URL string contains a beacon composed of an AG_MSG. In this URL substring, a destination service gateway is regarded as an initiator of a corresponding AR-MSG. In a specific embodiment, the URL substrings transmitted by AG-MSG and reach_AG_MSG may have some or all of the following keywords / slots: a host identifier (h 0st '), a sequence fool (' 'se q "), a digital signature (" s 丨 g "), a version number (nve rπ), a time value (π ί 1 me π), a user identifier (" 土 d „), a The maximum data rate parameter can also be regarded as the bandwidth and a destination URL (丨 丨 ur i 丨 丨 In a specific embodiment, the 'service gateway can receive an AG- MSG 'It is initialized through a strategy server. The service gateway can confirm the signature ("sig,") field value of the URL string containing an AR-MSG, in a specific embodiment' is calculated in the first A hashed MD 5 on the received message beginning with the keyword, and appended to the appropriate shared secret of the host name specified in the host field ("h 〇s tπ). That is, MD5 (message + shared secret), where π + π means serial connection. In addition to confirming the validity of the signature, the service gateway can also confirm that it contains an AG-M A sequence number (n s e qπ) in the URL string of the SG to ensure that it matches the sequence number of an earlier transmission A R-M S G.

第24頁 1223941 五、發明說明(19) 如果序號符合,服務閘道器便可將連接埠參數設定成在 A G - M S G中所指定攔位的描述,並且將使用者連接到服務門 道器的邏輯連接埠設定成授權狀態述。在一具體實施例中 ,不了解的AR-MSG攔位可透過服務閘道器忽略。如果_目 的地n u r 1 π是在A G - M S G指定,服務閘道器便可將使用者導 、 向此目的地URL。如此,服務閘道器可可提供一開啟螢幕 ,例如一旅館或不動產管理公司網站實體,用以管理使用 者所在的屬性。 在一具體實施例中,一主機可在一 AG-MSG指定由ASCII 字元所組成的一文字名稱或一 I P位址。在一具體實施例中 ,策略伺服器可包括它本身的主機名稱或丨P位址。格式是'_ _似在A R - M S G中的n h 〇 s tπ攔位。在一具體實施例中,策略 伺服器可回覆在AR-MSG中所提供的64位元非重複序號 (丨丨s e q'丨)。 在一具體實施例中,AG-MSG可包括一 MD5簽字欄位 (11 s i g") ’其可當作A R - M S G計算。在一具體實施例中, 可包括ASCII十進位格式的一協定版本值("ver”)。 在一具體實施例中,AG-MSG可包括一時間參數(n t imen ) 。在一具體實施例中,時間參數可指定最小的總時數與分 數,其是允許網際網路接達的授權。在其他的具體實施例 中,當授權接達網際網路屆滿時,時間參數可指定日期與鲁 日寺間,例如在2 0 0 0年2月2日的下午2 : 〇 〇。在一具體實施 例中,時間參數的格式是ASC I I十進位格式的一文數字序 列。例如,n t i m e二6 Ο π係對應6 〇分鐘或1小時;而且Page 24 1223941 V. Description of the invention (19) If the serial numbers match, the service gateway can set the port parameters to the description of the stop specified in AG-MSG, and connect the user to the logic of the service gateway The port is set to authorized status. In a specific embodiment, unknown AR-MSG stops can be ignored through the service gateway. If the destination n u r 1 π is specified in A G-M S G, the service gateway can direct the user to this destination URL. In this way, the service gateway can provide an opening screen, such as a hotel or real estate management company website entity, to manage the attributes of the user. In a specific embodiment, a host may specify a text name or an IP address composed of ASCII characters in an AG-MSG. In a specific embodiment, the policy server may include its own host name or IP address. The format is '_ _' like n h 〇 s tπ block in A R-M S G. In a specific embodiment, the policy server may respond to the 64-bit non-repeating serial number (丨 丨 e q '丨) provided in the AR-MSG. In a specific embodiment, the AG-MSG may include an MD5 signature field (11 sig ") ′ which may be calculated as A R-M S G. In a specific embodiment, a protocol version value (" ver ") in ASCII decimal format may be included. In a specific embodiment, the AG-MSG may include a time parameter (nt imen). In a specific embodiment The time parameter can specify the minimum total hours and scores, which is the authorization that allows Internet access. In other specific embodiments, when the authorized access expires, the time parameter can specify the date and time. Between temples, for example, at 2: 00 on February 2, 2000. In a specific embodiment, the format of the time parameter is a sequence of digits in the ASC II decimal format. For example, ntime 26 0 π corresponds to 60 minutes or 1 hour; and

IIII

第25頁 1223941 五、發明說明(20) ’’ time二 0 2 0 2 2 0 0 0 1 4 0 0 "係對應2〇〇〇 年2 月 2 日的下午2 : 〇〇。 在這些範例中,經由指定的連接埠的使用者網際網路接達 將在6 0分鐘或指定的日期與時間之後屆滿。 在一具體實施例中,AG-MSG可包括一使用者識別符 (n i dn )。在一具體實施例中,使用者識別符可識別一邏輯 連接蜂。在其他具體實施例中,識別符可以是一交談識別 符、一使用者名稱、使用者連接的一 I P號碼、使用者的一 帳戶號碼、一房間號碼等。使用者識別符可透過服務閘道 器儲存,並且以管理訊息或在服務閘道器内的其他處理、 在與策略伺服器的其他通訊、帳戶功能、與任何其他使用 表示。使用者識別符的範例包括:"i d = j 〇 e 一 s m i t h"、 ’’ id = 5"、與"id= 1 2 3 4 5 6 7 "。此外,在其他具體實施例中, 夕重使用者識別符可用來儲存類似的資訊,例如房間號碼 的” idl"、使用者名稱的” id2,,、帳戶號碼的” id3"等。這 些識別符在各種不同的具體實施例中可以是…⑺I與“(:1 十進位。 在一具體實施例中,AG-MSG可包括一參數,以指定從使 用者傳送及接收通訊的最大資料率或頻寬。該值能以每秒 仔個位元數目(Kbps)或每秒百萬位元數目(Mbps)指定,而 且可以是一ASCI I十進位值。最大資料率欄位的一範例是 ” bandWidth = 32” 。在此範例中,使用者的連接可描述呈有 32 Kbps的最大傳輸與接收速度。在一具體實施例中,/頻 ,關鍵字可以是-ASCI I字帛,其可識別在服務閘道器上 存在的-路由形狀輪廓。在此具體實施例巾,形狀輪廓包Page 25 1223941 V. Description of the invention (20) ′ ’time 2 0 2 0 2 2 0 0 0 1 4 0 0 " Corresponds to 2: 00 in the afternoon of February 2, 2000. In these examples, Internet access for users via the designated port will expire in 60 minutes or after the designated date and time. In a specific embodiment, the AG-MSG may include a user identifier (n i dn). In a specific embodiment, the user identifier can identify a logical connection bee. In other specific embodiments, the identifier may be a conversation identifier, a user name, an IP number connected by the user, an account number of the user, a room number, and the like. The user identifier can be stored through the service gateway and represented by management messages or other processing within the service gateway, other communications with the policy server, account functions, and any other use. Examples of user identifiers include: " i d = j 〇 e-s m i t h ", ’’ id = 5 ", and " id = 1 2 3 4 5 6 7 ". In addition, in other embodiments, the user identifier can be used to store similar information, such as "idl " for the room number," id2 "for the user name," id3 "for the account number, etc. These identifiers In various specific embodiments, it can be ... ⑺I and "(: 1 decimal. In a specific embodiment, the AG-MSG may include a parameter to specify the maximum data rate or frequency of communication transmitted and received from the user. Width. This value can be specified in kilobits per second (Kbps) or million bits per second (Mbps) and can be an ASCI I decimal value. An example of a maximum data rate field is "bandWidth" = 32 ". In this example, the user's connection can be described as having a maximum transmission and reception speed of 32 Kbps. In a specific embodiment, the key can be -ASCI I word, which can be identified in Existing on the service gateway-routing shape contour. In this embodiment, the shape contour package

第26頁 1223941 五、發明說明(21) 含例如傳輸及/或接收儲列深度、處理率、丟棄率、及其 他電腦通訊參數與資訊。 在一具體實施例中,AG-MSG可包括在一n ur 1 π欄位中的 · 一目的地URL指示。目的地URL可以是提供一網站的任何領 域名稱,例如一旅館或不動產管理公司實體的用以管理使 , 用者所屬性的網站。在其他的具體實施例中,任何其他網 頁可指定。一 n u r 1π欄位的範例是n u r 1 = h 11 p : / / w w w. somehotel.com" ° 包括在一具體實施例中的一描述、編碼、與大小的一 AG-MSG關鍵字摘要是在表2描述。 關鍵字 描述 編碼 大小(位元組) “ver” 協定版本 ASCII十進位 可變 “host” 訊息發起者的領域名稱 ASCII 可變 “mac” 用戶端的“MAC”位址 ASCII十六進位 12 “seq” 對應要求的序號 ASCII十六進位 16 “sig” MD5簽字 ASCII十六進位 16 “bandwidth” 允許最大的頻寬 ASCII 可變 “time” 授權的持續時間 ASCII十進位 可變 “id” 指定給邏輯連接埠的名稱 ASCII 可變 “url” 只要授權而導向的目的地網站 ASCII 可變Page 26 1223941 V. Description of the invention (21) Contains, for example, the transmission and / or reception bank depth, processing rate, discard rate, and other computer communication parameters and information. In a specific embodiment, the AG-MSG may include a destination URL indication in a n ur 1 π field. The destination URL can be any domain name that provides a website, such as a website of a hotel or real estate management company entity that manages the attributes of the user. In other embodiments, any other web page may be specified. An example of a nur 1π field is nur 1 = h 11 p: // ww w. Somehotel.com " ° A description of the description, encoding, and size included in a specific embodiment. An AG-MSG keyword summary is in Table 2 describes it. Keyword description encoding size (bytes) "ver" protocol version ASCII decimal variable "host" field name of message originator ASCII variable "mac" client's "MAC" address ASCII hexadecimal 12 "seq" Corresponding serial number ASCII hex 16 "sig" MD5 signature ASCII hex 16 "bandwidth" Allows maximum bandwidth ASCII variable "time" Authorized duration ASCII decimal variable "id" Assigned to logical port The name of the ASCII variable "url" is as long as the authorized destination website is ASCII variable

表2. AG-MSG關鍵字 在一具體實施例中,透過服務閘道器所準備的AG-MSG訊Table 2. AG-MSG keywords In a specific embodiment, the AG-MSG message prepared through the service gateway

第27頁 1223941 五、發明說明(22) 息,並且導向策略伺服器可是一 U RL詢問形式,而且格式 可如下所示:Page 27 1223941 V. Description of the invention (22), and the guide policy server can be a U RL query form, and the format can be as follows:

ttp://hostname?kevwordl=valuel&kevword2 =value2&kevword3=value3.··kevwordN=va1ueN F.範例ttp: // hostname? kevwordl = valuel & kevword2 = value2 & kevword3 = value3. ·· kevwordN = va1ueN F. Example

本發明的系統及方法可透過下列範例的檢討而更了解。 在此範例中,在多占有者建築物中的使用者可將一電腦插 入牆壁插座,此係連接到一接達集中器。該集中器可連接 到具有IP位址3 5. 42. 42. 42的一服務閘道器,其主機名稱 是somehotel.com。服務閘道器是與具有IP位址 192.168. 254.249的一策略伺服器有關,而且主機名稱是 hotelpolicyserver.com。在使用者開啟一網劉覽器,並 且指定例如h 11 p : / / w w w · t u t s y s · c om的一網頁之後,月艮矛务 閘道器可攔截網頁規格。如果要求的連接埠不是在授權狀 態,使用者便拒絕接達網際網路。然而,服務閘道器可準 備傳送給使用者當作一HTTP重新導向訊息的一AR-MSG,例 如: ttp://hotelpolicyserver.com/pp/ welcome.php3?port = 1 9 2. 1 6 8. 2 54. 2 1 1 - 0 2 0 0 7&hostThe system and method of the present invention can be better understood by reviewing the following examples. In this example, a user in a multi-occupier building can plug a computer into a wall outlet, which is connected to an access concentrator. The concentrator can be connected to a service gateway with IP address 3 5. 42. 42. 42 and its host name is somehotel.com. The service gateway is associated with a policy server with an IP address of 192.168. 254.249, and the host name is hotelpolicyserver.com. After the user opens a web browser and specifies a web page such as h 11 p: // w w w · t u t s s s · co om, the Moongate Gateway can intercept the web page specifications. If the requested port is not authorized, the user refuses access to the Internet. However, the service gateway can be prepared to send to the user an AR-MSG as an HTTP redirect message, for example: ttp: //hotelpolicyserver.com/pp/ welcome.php3? Port = 1 9 2. 1 6 8 2 54. 2 1 1-0 2 0 0 7 & host

=somehotel.com&mac=00a00cll47fl&origurL =www%2etutsys%2ecom%2f&seq =1828d81492b2c044461fd709f0a5637b&sig =6d39e8d81bfbfcad490e908ec60d6d7a= somehotel.com & mac = 00a00cll47fl & origurL = www% 2etutsys% 2ecom% 2f & seq = 1828d81492b2c044461fd709f0a5637b & sig = 6d39e8d81bfbfcad490e908ec60d6d7a

第28頁 1223941 五、發明說明(23) 使用者的瀏覽器可執行此URL。在反應方面,策略伺服 器可提供一網頁,該網頁可提供歡迎資訊與要求付款資訊 與使用資訊。在一具體實施例中,此付款資訊可以是協議 ’以便索取使用者旅館房間帳單的特殊費用,可提示使用 者輸入信用卡資訊等。此可經由使用例如繪圖、文字、文 字登錄欄位、下拉式選單、按鈕、捲動軸等的使用者界面 技術而達成。在一具體實施例中,通常的閘道器介面 (CGI) scripts JAVA® applets、及其他網頁技術可結合 。在提供付款資訊與使用資訊之後,使用者然後必須接受 使用的項目及確認付款資訊與使用資訊。此可透過在網頁 中的一按鈕上按一下、或透過其他使用者界面技術而達成 。透過確認的資訊,與網頁有關的一連結或網站參考可啟 動以導向使用者的網站瀏覽器,而將付款資訊傳送給策略 伺服器。 策略伺服器然後可處理付款資訊與使用資訊。策略伺服 器然後可決定允許或拒絕使用者的網際網路接達。如果拒 絕接達,策略伺服器可將一連接拒絕網頁與使用者通訊。 如果接達允許,策略伺服器便以包含一HTTP詢問的一URL 格式而產生一 AG- MSG,並且使URL與使用者的劉覽器相通 訊,以便將使用者重新導向服務閘道器: http://servicegw.somehotel.com/PublicPort /PP-Authenticate?id=l+seq =1828d81492b2c044461fd7090a5637b+url =http%3a%2f%2fwww%2etutsys%2ecom%2f+sigPage 28 1223941 V. Description of the invention (23) The user's browser can execute this URL. In terms of response, the strategy server can provide a web page that can provide welcome information and payment information and usage information. In a specific embodiment, this payment information may be an agreement ′ in order to obtain a special fee for the hotel room bill of the user, and may prompt the user to enter credit card information and the like. This can be achieved through the use of user interface technologies such as drawing, text, text registration fields, pull-down menus, buttons, scrollers, etc. In a specific embodiment, common gateway interface (CGI) scripts JAVA® applets, and other web technologies can be combined. After providing the payment and usage information, the user must then accept the items used and confirm the payment and usage information. This can be done with a click of a button in a web page, or through other user interface technologies. With the confirmed information, a link or website reference related to the webpage can be launched to direct the user's web browser and the payment information is sent to the strategy server. The strategy server can then process the payment and usage information. The policy server can then decide to allow or deny the user's Internet access. If access is denied, the policy server may communicate a connection-rejected page to the user. If the access is allowed, the policy server generates an AG-MSG in a URL format containing an HTTP query, and communicates the URL with the user's browser to redirect the user to the service gateway: http : //servicegw.somehotel.com/PublicPort / PP-Authenticate? id = l + seq = 1828d81492b2c044461fd7090a5637b + url = http% 3a% 2f% 2fwww% 2etutsys% 2ecom% 2f + sig

第29頁 1223941 五、發明說明(24) =7863e5a6d77e0e9b5ab472ea7e71e053 當使用者接收此URL時,使用者的網站瀏覽器可導向服 務閘道器。服務閘道器可響應接收來自使用者的A G _ M S G而 將使用者的邏輯連接埠狀態改變成授權,提供指定的 nauthok.h1:ml"網頁,並且提供使用者網際網路接達。在 一具體實施例中,當最初嘗試透過提供序號而存取一 、 資料庫而接達網際網路時,服務閘道器亦可取回:域 指定的原始URL,連接埠號碼或其他唯一識別符者所 訊檢索。 τ』用於資 因此Page 29 1223941 V. Description of the invention (24) = 7863e5a6d77e0e9b5ab472ea7e71e053 When the user receives this URL, the user's web browser can be directed to the service gateway. The service gateway can change the user's logical port status to authorized in response to receiving A G_MSG from the user, provide the specified nauthok.h1: ml " web page, and provide the user with Internet access. In a specific embodiment, when initially attempting to access a database by providing a serial number to access the Internet, the service gateway can also retrieve: the original URL specified by the domain, the port number, or other unique identification Search by operator. τ ′ is used for information

在前述的規格中,本 而,很顯然各種不同的 在附錄申請專利所發表 格與圖式只是描述而不 發明已描述特殊的具體 修改與變化可達成,而 的本發明的精神與範圍 是限制。In the foregoing specifications, it is clear that the various forms and drawings issued in the appendix of the patent application are only descriptions, but the invention has been described. Specific specific modifications and changes can be achieved, and the spirit and scope of the present invention are limited .

第30頁Page 30

Claims (1)

1223941 丨案號90100748 年 月 修正 \、申請專利範圍 1 . 一種用以管理網路接達之方法,包含: 從一使用者接收一網路接達要求; 將有關使用者的一授權要求訊息經由使用者的一網路 接達應用程式而傳送給一策略伺服器; 從網路接達應用程式接收有關該策略伺服器所初始化 使用者的一訊息授權訊息;及 響應接收該允許授權訊息而提供接達一網路的該網路 接達應用程式。 其中該網路接達應用 而且該網路包含該網 其中該網路接達要求 其中該傳送包含: 2 .如申請專利範圍第1項之方法 程式可包含一網際網路網站瀏覽器 際網路。 3 .如申請專利範圍第1項之方法 可包含一網際網路網站接達要求。 4 .如申請專利範圍第1項之方法 將該網路接達應用程式重新導向該策略伺服器。 5 .如申請專利範圍第4項之方法,其中該重新導向包 含: 通訊一超文字傳輸協定(HT TP )能一致性資源識別符 (U R I )形式而重新導向使用者的一網際網路網站瀏覽器< 6 .如申請專利範圍第1項之方法,其中該傳送包含: 計算該授權要求訊息的一數位簽字。 7 .如申請專利範圍第1項之方法,其中該授權要求訊j 包含: 一連接谭識別符;1223941 丨 Amendment of case number 90100748 \, patent application scope 1. A method for managing network access, including: receiving a network access request from a user; passing an authorization request message about the user through A network access application of the user is sent to a policy server; a message authorization message about the user initialized by the policy server is received from the network access application; and provided in response to receiving the permission authorization message The network access application that accesses a network. Wherein the network access application and the network includes the network where the network access request includes which the transmission includes: 2. If the method of patent application No. 1 method program may include an Internet website browser Internet . 3. The method of item 1 of the scope of patent application may include an Internet website access request. 4. The method of item 1 of the scope of patent application redirects the network access application to the policy server. 5. The method according to item 4 of the scope of patent application, wherein the redirection includes: communication-hypertext transfer protocol (HT TP) can redirect the user to an Internet website browsing in the form of a consistent resource identifier (URI) ≪ 6. The method according to item 1 of the patent application scope, wherein the transmitting includes: calculating a digital signature of the authorization request message. 7. The method of claim 1 in the scope of patent application, wherein the authorization request message j includes: a connection identifier; O:\68\68698-930506.ptc 第32頁 1223941 貌_ :i案號 90100748 a 修正 申請專利範圍 一主機 一媒體 一原始 一序號 根據一 一版本 識別符; 接達控制(MAC )位址; 一致性資源定位器(U R L )指示; 共用秘密之一數位簽字;及 編號。 8.如申請專利範圍第1項之方法,其中該授權允許訊 包含: 一主機識別符; 一序號; 根據一 一版本 一時間 一使用 一最大資料 共用秘密之一數位簽字 編號; 值; 者識 別符; 率參數;及 一目的地一 9 .如申請專利 檢查該授權 1 0 .如申請專利 檢查該授權 1 1 · 一種用以管 從一使用者 ,其是透過一服 處理從使用 致性資源定位器(U R L )。 範圍第1項之方法,其進一步包含: 允許訊息的一序號是否正確。 範圍第1項之方法,其進一步包含: 允許訊息的一數位簽字是否正確。 理網路接達之方法,包含: 的網路接達應用程式接收一授權要求訊息 務閘道器而開始; 者接收的一付款資訊;及O: \ 68 \ 68698-930506.ptc Page 32 1223941 Appearance: i Case No. 90100748 a Amend the scope of patent application-host-media-original-serial number according to 11 version identifier; Access Control (MAC) address; Consistent Resource Locator (URL) instructions; a digital signature of a shared secret; and a number. 8. The method according to item 1 of the patent application scope, wherein the authorization permission message includes: a host identifier; a serial number; a digital signature number using one of the largest data sharing secrets according to the 11 version and the time; value; Rate; parameter; and a destination 9. If the patent is applied for inspection, the authorization is 10. If the patent is applied for inspection, the authorization is 1 1 · A method for managing a user, which uses a uniform service to locate resources URL (URL). The method of scope item 1 further includes: whether a serial number of the permitted message is correct. The method of scope item 1 further includes: whether a digital signature of the allowed message is correct. A method for managing network access, including: the network access application of the network receiving application starts with receiving an authorization request message; a payment information received by the application; and O:\68\68698-930506.ptc 第33頁 止替條 if: PI 丨案號 90100748 年 月 曰 修正 六、申請專利範圍 將有關 程式而提供 1 2 .如申請 程式包含一 1 3 ·如 從 接 1 4 ·如 將 15. 如 處 16. 如 從 接 17」口 將 1 8.如 檢 1 9.如 計 2 0 .如 將 2 1 ·如 含: 申請 使用 收來 申請 一網 申請 理從 申請 使用 收來 申請 一網 申請 查該 申請 算該 申請 該網 申請 使用 給服 專利 網際 專利 者要 自使 專利 頁提 專利 使用 專利 者要 自使 專利 頁提 專利 授權 專利 授權 專利 路接 專利 者的 務閘 範圍 網路 範圍 求該 用者 範圍 供給 範圍 者接 範圍 求該 用者 範圍 供給 範圍 要求 範圍 允許 範圍 達應 範圍 授權允許訊息經由該網路接達應用 道器。 第1 1項 網站瀏 第1 1項 付款資 的付款 第1 3項 一網際 第1 1項 收的一 第15項 使用資 的該使 第1 6項 一網際 第1 1項 訊息的 第1 1項 訊息的 第1 1項 用程式 第20項 之方 覽器 之方 訊; 資訊 之方 網路 之方 使用 之方 訊; 用資 之方 網路 之方 一數 之方 一數 之方 重新 之方 法,其中該網路接達應用 法,其進一步包含: 法,其中該要求包含: 網站瀏覽器。 法,其進一步包含: 資訊。 法,其進一步包含: 訊。 法,其中該要求包含: 網站瀏覽器。 法,其進一步包含: 位簽字是否正確。 法,其中提供包含: 位簽字。 法,其中該提供包含: 導向該服務閘道器。 法,其中該重新導向包O: \ 68 \ 68698-930506.ptc Page 33 Non-replacement clause if: PI 丨 Case No. 90100748 Amendment VI. The scope of the patent application will provide the relevant program 1 2. If the application program contains a 1 3 · Such as from Connect 1 4 · If you are 15. If you are 16. If you are from 17 ", you will be 1 8. If you check 1 9. If you are counting 2 0. If you will be 2 1 · If you include: Apply for a receipt to apply for a network application Apply for the use of the application to apply for a web application to check the application is considered to apply for the application of the network to the service patents Internet patents must self-patent the patent page patents Patent users should self-patent the patent page patents authorized patents authorized patents road access patents The service range network range requires the user range, the supply range, the user range, the user range, the supply range, and the request range. The range permits the range. The range authorization permits the message to access the application via the network. Item 11 Website View Item 11 Payment of Payment Funds Item 13-Internet Item 11 Received Item 15-Use of Funds Item 16 Item 1 Internet Item 11 1 The 11th item of the message is the message of the browser of the 20th item of the program; the message of the party using the information; the message of the party using the network; the party using the network; Method, wherein the network access application method further includes: method, wherein the request includes: a web browser. Law, which further includes: information. Law, which further includes: Law, where the requirements include: A web browser. Law, which further includes: whether the signature is correct. The law, which provides: Bit signature. Method, where the provision includes: directing the service gateway. Method in which the redirect package O:\68\68698-930506.ptc 第34頁 1223941 案號 90100748 年 月 曰 修正 六、申請專利範圍 通訊一超文字傳輸協定(Η T T P )能一致性資 (U R I )形式而重新導向一網際網路網站瀏覽器1 2 2 .如申請專利範圍第1 1項之方法,其中該處 查證該付款資訊不是欺詐,而且並非是不 如果該付款資訊是不足夠或欺詐,將一接 傳送給使用者。 2 3 .如申請專利範圍第2 2項之方法,其中該傳 將一網頁提供給使用者的一網際網路網站 2 4. —種當透過一處理器的執行使機器執行操 儲存該等指令的機器可讀媒體,包含: 從一使用者接收一網路接達要求; 將有關使用者的一授權要求訊息經由使用 接達應用程式而傳送給一策略伺服器; 從網路接達應用程式接收有關該策略伺服 使用者的一訊息授權訊息;及 回應接收而提供接達該網際網路的該網路 式。 2 5 .如申請專利範圍第2 4項之機器可讀媒體, 包含: 將該網路接達應用程式重新導向該策略伺 2 6 .如申請專利範圍第2 5項之機器可讀媒體, 導向包含: 通訊一超文字傳輸協定(HTTP)能一致性資 (U R I )形式而重新導向使用者的一網站瀏覽器。 源識別符 ► 理包含: 足夠;及 達拒絕訊息 送包含: 瀏覽器。 作時具有可 者的一網路 器所初始化 接達應用程 其中該傳送 服器。 其中該重新 源識別符O: \ 68 \ 68698-930506.ptc Page 34 1223941 Case No. 90100748 Amendment VI. Patent Application Communication-Hypertext Transfer Protocol (Η TTP) can be redirected to an Internet in the form of a URI Road web browser 1 2 2. If the method of the scope of patent application No. 11 is applied, the department verifies that the payment information is not fraudulent, and it is not that if the payment information is insufficient or fraudulent, it will be sent to the user . 2 3. The method according to item 22 of the scope of patent application, wherein the web site provides an Internet site to the user. 2 4. A method for executing the operation of a machine through a processor to store the instructions. Machine-readable media including: receiving a network access request from a user; transmitting an authorization request message about the user to a policy server by using the access application; accessing the application from the network Receiving a message authorization message about the policy server user; and providing the network-type access to the Internet in response to the reception. 25. If the machine-readable medium in the 24th scope of the patent application includes: redirecting the network access application to the strategy 22.6. If the machine-readable medium in the 25th scope of the patent application, guides Contains: a web browser that redirects the user in the form of communication-hypertext transfer protocol (HTTP) which can be consistent with a URI. Source Identifier ► Management Contains: Enough; and A Reject Message is sent Contains: Browser. The server is initialized by a network device that is capable of accessing the application. Where the re-source identifier O:\68\68698-930506.ptc 第35頁 1223941 S3. 案號 90100748 修正 t、申請專利範圍 2 7 .如申 令可使機 檢查 2 8 .如申 令可使機 檢查 請專利範圍 器執行操作 該授權允許 請專利範圍 器執行操作 該授權允許 29. —種當透過一處 儲存該等指令 從一使用 其 程式 30. 令可 31 . 令可 32. 包含 33. 包含 是透 處理 將有 而提 如申 使機 處理 如申 使機 檢查 如申 計算 如申 過一 從使 關使 供給 請專 器執 從使 請專 器執 該授 請專 的機器 者的網 服務閘 用者接 用者的 服務閘 利範圍 行操作 用者接 利範圍 行操作 權要求 利範圍 第2 4項之機器可讀媒體,其中該等指 ,其進一步包含: 訊息的一序號是否正確。 第2 4項之機器可讀媒體,其中該等指 ,其進一步包含: 訊息的一數位簽字是否正確。 理器的執行使機器執行操作時具有可 可讀媒體,包含: 路接達應用程式接收一授權要求訊息 道器而開始; 收的一付款資訊;及 一授權允許訊息經由該網路接達應用 道器。 第2 9項之機器可讀媒體,其中該等指 ,其進一步包含: 收的一使用資訊。 第2 9項之機器可讀媒體,其中該等指 ,其進一步包含: 訊息的 第29項 一數位簽字是否正確。 之機器可讀媒體,其中該提供 該授權允許 請專利範圍 訊息的一數位簽字。 第2 9項之機器可讀媒體,其中該提供O: \ 68 \ 68698-930506.ptc Page 35 1223941 S3. Case No. 90100748 Amendment t. Application for patent scope 2 7. If an order is made to inspect the machine 2 8. If an order is made to inspect the machine, please use the patent scope Operation of this authorization allows the patent scope to perform the operation. This authorization allows 29. — a kind of use of the program from a store to store these instructions from 30. Order can 31. Order can 32. Contains 33. Including is transparent processing will have The requester handles the request, checks the requester, calculates the requester, supplies the requester, and instructs the requester to perform the request. The user of the service area shall apply for the machine-readable medium of item 24 of the scope of operation right, where these refers to, which further includes: whether the serial number of the message is correct. The machine-readable medium of item 24, where these refer to, further comprising: whether the digital signature of the message is correct. The execution of the processor enables the machine to have a readable medium when performing the operation, including: the road access application program starts receiving an authorization request message channel; a payment information is received; and an authorization permission message accesses the application channel through the network Device. The machine-readable medium of item 29, wherein these refer to, further comprising: a usage information received. Item 29. The machine-readable medium, which refers to, further includes: Item 29 of the message. Is the digital signature correct? A machine-readable medium in which the authorization is provided to allow a digital digit signature of the patent scope message. The machine-readable medium of item 29, wherein the providing O:\68\68698-930506.ptc 第36頁 1223941 5, or :案號 901Q0748 年 月 修正 六、申請專利範圍 將該網路接達應用程式重新導向該服務閘道器。 3 4.如申請專利範圍第3 3項之機器可讀媒體,其中該重新 導向包含: 通訊一超文字傳輸協定(HT TP )能一致性資源識別符 (U R I )形式而重新導向使用者的一網際網路網站瀏覽器。 3 5 .如申請專利範圍第2 9項之機器可讀媒體,其中該處理 包含: « 查證該付款資訊不是欺詐,而且並非是不足夠;及 如果該付款資訊是不足夠或欺詐,將一接達拒絕訊息 傳送給使用者。 3 6 . —種用以管理網路接達之系統,包含: 一策略伺服器;及 一服務閘道器,以便從網路接達應用程式接收一網路 接達要求,將有關一使用者的授權要求訊息經由該網路接 達應用程式而傳送給該策略伺服器,並且從該網路接達應 用程式接收有關透過該策略伺服器所初始化使用者的授權 允許訊息; 其中該服務閘道器是響應接收該授權允許訊息而提供 使用者可接達一網路。 3 7.如申請專利範圍第3 6項之系統,其中該網路是網際網 路。 3 8 .如申請專利範圍第3 6項之系統,其中該網路接達應用 程式是一網際網路網站瀏覽器。O: \ 68 \ 68698-930506.ptc Page 36 1223941 5, or: Case No. 901Q0748 Month Amendment VI. Patent Application Scope Redirect the network access application to the service gateway. 3 4. The machine-readable medium according to item 33 of the patent application scope, wherein the redirection includes: a communication-hypertext transfer protocol (HT TP) that can be consistent with the resource identifier (URI) form and redirect the user Internet website browser. 35. If the machine-readable medium of item 29 of the patent application scope, the processing includes: «verifying that the payment information is not fraudulent and not insufficient; and if the payment information is insufficient or fraudulent, A rejection message was sent to the user. 3 6. — A system for managing network access, including: a policy server; and a service gateway to receive a network access request from a network access application and send a related user Of the authorization request message is transmitted to the policy server through the network access application, and receives an authorization permission message from the network access application about the user initialized through the policy server; wherein the service gateway The device is responsive to receiving the authorization permission message and provides the user with access to a network. 37 7. The system according to item 36 of the patent application scope, wherein the network is the Internet. 38. The system according to item 36 of the scope of patent application, wherein the network access application is an Internet website browser. O:\68\68698-930506.ptc 第37頁O: \ 68 \ 68698-930506.ptc Page 37
TW90100748A 2000-01-13 2001-02-20 System and method for managing network access TWI223941B (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US17718700P 2000-01-13 2000-01-13
US71449700A 2000-11-15 2000-11-15

Publications (1)

Publication Number Publication Date
TWI223941B true TWI223941B (en) 2004-11-11

Family

ID=26873017

Family Applications (1)

Application Number Title Priority Date Filing Date
TW90100748A TWI223941B (en) 2000-01-13 2001-02-20 System and method for managing network access

Country Status (5)

Country Link
EP (1) EP1250650A1 (en)
JP (1) JP2003519871A (en)
AU (1) AU2001226383A1 (en)
TW (1) TWI223941B (en)
WO (1) WO2001052071A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7826842B2 (en) 2005-07-01 2010-11-02 Research In Motion Limited System and method for managing forbidden network lists on a wireless user equipment (UE) device
TWI452870B (en) * 2006-12-21 2014-09-11 Hewlett Packard Co Network traffic redirection in bi-planar networks

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2413863A (en) * 2004-05-08 2005-11-09 Ibm Method and system for distribution of information
CN100372303C (en) * 2004-12-13 2008-02-27 华为技术有限公司 Method for realizing pre-payment user internet policy dynamic change
DE102006051652B4 (en) * 2006-11-02 2013-02-28 Deutsche Telekom Ag Method and arrangement for changing and / or activating parameters during connection of a subscriber to the Internet
CN101150853A (en) * 2007-10-29 2008-03-26 华为技术有限公司 A network system, policy management control server and policy management control method
EP2166701A1 (en) * 2008-09-18 2010-03-24 Thomson Telecom Belgium Device and method for retrieving information from a device
US9112830B2 (en) * 2011-02-23 2015-08-18 Mcafee, Inc. System and method for interlocking a host and a gateway
CN108512808B (en) * 2017-02-24 2019-05-31 北京数安鑫云信息技术有限公司 A kind of malicious requests hold-up interception method and system improving access response speed

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0981519A (en) * 1995-09-08 1997-03-28 Kiyadeitsukusu:Kk Authentication method on network
US5802518A (en) * 1996-06-04 1998-09-01 Multex Systems, Inc. Information delivery system and method
US5864871A (en) * 1996-06-04 1999-01-26 Multex Systems Information delivery system and method including on-line entitlements
US5819271A (en) * 1996-06-04 1998-10-06 Multex Systems, Inc. Corporate information communication and delivery system and method including entitlable hypertext links
US5926624A (en) * 1996-09-12 1999-07-20 Audible, Inc. Digital information library and delivery system with logic for generating files targeted to the playback device
US5961590A (en) * 1997-04-11 1999-10-05 Roampage, Inc. System and method for synchronizing electronic mail between a client site and a central site

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7826842B2 (en) 2005-07-01 2010-11-02 Research In Motion Limited System and method for managing forbidden network lists on a wireless user equipment (UE) device
TWI452870B (en) * 2006-12-21 2014-09-11 Hewlett Packard Co Network traffic redirection in bi-planar networks

Also Published As

Publication number Publication date
WO2001052071A1 (en) 2001-07-19
AU2001226383A1 (en) 2001-07-24
EP1250650A1 (en) 2002-10-23
WO2001052071A9 (en) 2002-12-19
JP2003519871A (en) 2003-06-24

Similar Documents

Publication Publication Date Title
US8578465B2 (en) Token-based control of permitted sub-sessions for online collaborative computing sessions
US7661129B2 (en) Secure traversal of network components
TW532024B (en) System for distributed network authentication and access control
EP1998506B1 (en) Method for controlling the connection of a virtual network
JP3762882B2 (en) Internet server access management and monitoring system
US7886343B2 (en) Authentication service for facilitating access to services
US7818576B2 (en) User controlled anonymity when evaluating into a role
CN101350717B (en) Method and system for logging on third party server through instant communication software
US20090077649A1 (en) Secure messaging system and method
US7512973B1 (en) Wireless-access-provider intermediation to facilliate digital rights management for third party hosted content
US10116628B2 (en) Server-paid internet access service
US9124606B2 (en) Methods, apparatuses and systems facilitating seamless, virtual integration of online membership models and services
KR20040069339A (en) Method and system for secure handling of electronic business transactions on the internet
JP2002523973A (en) System and method for enabling secure access to services in a computer network
JP2003527672A (en) Method and apparatus for providing secure authentication of a portable device via an internet host server
EP2786607A1 (en) Mutually authenticated communication
US20060265506A1 (en) Systems and methods for establishing and validating secure network sessions
TWI223941B (en) System and method for managing network access
US20020035686A1 (en) Systems and methods for secured electronic transactions
US20020165783A1 (en) Accounting in peer-to-peer data communication networks
TWI261446B (en) Client service architecture using HTTPS communication protocol and method thereof
TW202326492A (en) Device, method and system of handling access control
Bradner Source Directed Access Control on the Internet
Chen Advanced BizTalk Messaging Features
CA2601654A1 (en) Secure messaging system and method