WO2016112613A1 - 接入控制方法、装置及宽带远端接入服务器bras - Google Patents
接入控制方法、装置及宽带远端接入服务器bras Download PDFInfo
- Publication number
- WO2016112613A1 WO2016112613A1 PCT/CN2015/080604 CN2015080604W WO2016112613A1 WO 2016112613 A1 WO2016112613 A1 WO 2016112613A1 CN 2015080604 W CN2015080604 W CN 2015080604W WO 2016112613 A1 WO2016112613 A1 WO 2016112613A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- access control
- list
- address
- terminal
- domain
- Prior art date
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
Definitions
- the present invention relates to the field of communications, and in particular, to an access control method and apparatus, and a broadband remote access server BRAS.
- the embodiment of the present invention provides an access control method, a device, and a broadband remote access server (BRAS), so as to at least solve the need in the related art to perform access control on users in different address segments, resulting in cumbersome access control operations. complicated question.
- BRAS broadband remote access server
- an access control method including: acquiring a network protocol IP address and a carried service access list SAL information carried by a terminal when accessing a network, where the SAL information includes a list information, where the list information is used to determine a list for identifying a correspondence between the IP address and the domain; and determining, according to the IP address and the list, a domain corresponding to the terminal when the terminal accesses the network Access control policy; performing access control on the terminal according to the access control policy.
- At least the following information is stored in the list: an IP address segment, a mask length, a domain name of the domain, an IP address segment, and a domain correspondence.
- the method further includes: sending the determined access control policy to the Said terminal.
- the access control policy includes a rate limiting policy that restricts the terminal from accessing the network.
- the list includes a hash table.
- an access control apparatus including: an obtaining module, configured to acquire a network protocol IP address and a service access list SAL information carried by a terminal when accessing a network, where The SAL information includes list information, where the list information is used to determine a list for identifying a correspondence between the IP address and the domain; and the determining module is configured to determine the terminal according to the IP address and the list An access control policy corresponding to a domain in which the network is located; the control module is configured to perform access control on the terminal according to the access control policy.
- At least the following information is stored in the list: an IP address segment, a mask length, a domain name of the domain, an IP address segment, and a domain correspondence.
- the access control device further includes: a sending module, configured to send the determined access control policy to the terminal.
- the access control policy includes a rate limiting policy that restricts the terminal from accessing the network.
- the list includes a hash table.
- a broadband remote access server BRAS comprising the apparatus of any of the above.
- the network protocol IP address and the carried service access list SAL information carried by the terminal when accessing the network are obtained, where the SAL information includes list information, and the list information is used for determining Defining a list of the correspondence between the IP address and the domain; determining, according to the IP address and the list, an access control policy corresponding to a domain in which the terminal accesses the network; according to the access control policy Performing access control on the terminal, which solves the problem that the access control of the users in different address segments needs to be performed separately in the related art, which causes the access control operation to be cumbersome and complicated, thereby reducing the access control operation for the user.
- the effect of complexity is a block fill action, a packet fill action, and the carried service access list SAL information carried by the terminal when accessing the network.
- FIG. 1 is a flow chart of an access control method according to an embodiment of the present invention.
- FIG. 2 is a structural block diagram of an access control apparatus according to an embodiment of the present invention.
- FIG. 3 is a block diagram showing a preferred structure of an access control apparatus according to an embodiment of the present invention.
- FIG. 4 is a structural block diagram of a broadband remote access server BRAS according to an embodiment of the present invention.
- FIG. 5 is a flow chart of a first rate limiting strategy in accordance with an embodiment of the present invention.
- FIG. 6 is a flow chart of a second rate limiting strategy in accordance with an embodiment of the present invention.
- FIG. 1 is a flowchart of an access control method according to an embodiment of the present invention. As shown in FIG. 1, the process includes the following steps:
- Step S102 Obtain a network protocol IP address and a service access list SAL information carried by the terminal when accessing the network, where the SAL information includes list information, where the list information is used to determine the identifier for identifying the IP address and the domain. a list of correspondences;
- Step S104 Determine, according to the foregoing IP address and the list, an access control policy corresponding to a domain in which the terminal accesses the network;
- Step S106 Perform access control on the terminal according to the access control policy.
- the domain to which the terminal belongs is determined according to the IP address carried by the terminal, and then the access control is performed on the terminal according to the access control policy in the domain, thereby eliminating the need for access control processing for each user terminal, thereby solving the problem.
- the related technologies need to perform access control on users in different address segments respectively, which leads to the cumbersome and complicated operation of the access control operation, thereby achieving the effect of reducing the complexity of the access control operation for the user.
- the above information may include at least the following information: an IP address segment, a mask length, a domain name, an IP address segment, and a domain correspondence.
- the determined access control policy may also be sent to the terminal.
- the terminal After receiving the access control policy, the terminal can save the access control policy to implement backup of the access control policy.
- the foregoing access control policy may control multiple aspects of content.
- the foregoing access control policy may include a rate limiting policy for restricting the terminal from accessing the network, thereby implementing the pair of different IP address segments according to the foregoing embodiment.
- Users implement different speed limit strategies to protect the interests of users.
- the above list may be in various forms.
- the above list includes a hash table, and the hash table is used to store the above information.
- module may implement a combination of software and/or hardware of a predetermined function.
- apparatus described in the following embodiments is preferably implemented in software, hardware, or a combination of software and hardware, is also possible and contemplated.
- FIG. 2 is a structural block diagram of an access control apparatus according to an embodiment of the present invention. As shown in FIG. 2, the apparatus includes an acquisition module 22, a determination module 24, and a control module 26. The apparatus will be described below.
- the obtaining module 22 is configured to obtain a network protocol IP address and a service access list SAL information carried by the terminal when accessing the network, where the SAL information includes list information, where the list information is used to determine the identifier for identifying the IP address.
- the determining module 24 is configured to perform access control on the terminal according to the foregoing access control policy.
- the above information includes at least the following information: an IP address segment, a mask length, a domain name, an IP address segment, and a domain correspondence.
- FIG. 3 is a block diagram of a preferred structure of an access control apparatus according to an embodiment of the present invention. As shown in FIG. 3, the apparatus includes a delivery module 32 in addition to all the modules shown in FIG. Description.
- the sending module 32 is connected to the determining module 24, and is configured to send the determined access control policy to the terminal.
- the foregoing access control policy may include a rate limiting policy for restricting the terminal from accessing the network.
- the above list may include a hash table.
- FIG. 4 is a block diagram showing the structure of a broadband remote access server BRAS according to an embodiment of the present invention. As shown in FIG. 4, the BRAS 42 includes the access control device 44 of any of the above.
- the following describes the invention by taking an access control policy as a rate limiting policy and a list as a hash table.
- users in different IP address segments are controlled to access from different domains by adding configuration commands in a Service Access List (SAL), and thus to different domains.
- SAL Service Access List
- Users are configured with rate limiting policies.
- FIG. 5 is a flowchart of a first rate limiting policy according to an embodiment of the present invention. As shown in FIG. 5, the process includes the following steps:
- Step S502 Add a configuration command match-address ⁇ string>ip-address ⁇ ipv4-address/mask-length>domain ⁇ domain-name> in the SAL template, and confirm the address segment by the address + mask length, under a SAL template. Supports entry configuration for up to 64 address segments to translate domain names.
- step S504 when the user goes through the application interface module (Application Interface Module, AIM for short), the AIM obtains the IP address carried by the user and the SAL information.
- the application interface module Application Interface Module, AIM for short
- the AIM obtains the IP address carried by the user and the SAL information.
- Step S506 the IP address carried by the user is checked. If the IP address belongs to an address segment in a configured match-address entry, the user is mapped to the corresponding domain.
- Step S508 in the domain authorization template, configure a related speed limit and other policies for the user of the specified IP address segment.
- step S510 the policy of limiting the rate is sent to the user along with the authorization information of the domain where the user is located.
- FIG. 6 is a flowchart of a second rate limiting policy according to an embodiment of the present invention. As shown in FIG. 6, the process includes the following steps:
- the network segment, the mask length, the domain name, and the like configured in the foregoing operations may be stored in the form of a hash table.
- the establishment of the hash table is based on the mask length as the index to join the conflict, and the network segment as the key value to add the conflicting node.
- Step S602 starting.
- Step S604 extracting the user IP address and the SAL information, wherein the AIM component extracts the IP address and SAL information carried by the user when the user goes online through the Application Interface Module (AIM) component.
- AIM Application Interface Module
- Step S606 it is found whether there is the above hash table in the SAL information, if yes, go to step S608, otherwise go to step S612.
- Step S608 it is checked whether the IP address carried by the user belongs to the network segment stored in a certain hash node, and if yes, go to step S610, otherwise go to step S612.
- step S610 the ip address belongs to an address segment in a configured match-address entry, and the user is mapped to the specified domain according to the configuration information.
- step S612 the domain that the user comes with is used.
- Step S614 obtaining an authorization template bound to the domain.
- Step S616 Acquire a policy such as a rate limit configured by the user configured as the specified IP address segment in the authorization template.
- step S618 the authorization information is returned to the user.
- Step S620 ending.
- the user domain is matched according to the ip address segment, and the users of different address segments are mapped to different domains, and then different policies are set for different user access domains, thereby effectively solving the problem.
- the related technologies need to perform access control on users in different address segments, which causes the access control operation to be cumbersome and complicated.
- modules or steps of the present invention described above can be implemented by a general-purpose computing device that can be centralized on a single computing device or distributed across a network of multiple computing devices. Alternatively, they may be implemented by program code executable by the computing device such that they may be stored in the storage device by the computing device and, in some cases, may be different from the order herein.
- the steps shown or described are performed, or they are separately fabricated into individual integrated circuit modules, or a plurality of modules or steps thereof are fabricated as a single integrated circuit module.
- the invention is not limited to any specific combination of hardware and software.
- the access control method and apparatus and the broadband remote access server BRAS provided by the embodiments of the present invention have the following beneficial effects: the user domain is matched according to the ip address segment, and the users of different address segments are mapped to different In the domain, the different policies are set for different user access domains, which effectively simplifies the need to perform access control for users in different address segments, which reduces the complexity of access control operations.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
本发明提供了一种接入控制方法、装置及宽带远端接入服务器BRAS,其中,该方法包括:获取终端接入网络时携带的网络协议IP地址和携带的服务接入列表SAL信息,其中,该SAL信息中包括有列表信息,该列表信息用于确定用于标识上述IP地址和域的对应关系的列表;根据上述IP地址和列表确定终端接入网络时所处的域对应的接入控制策略;根据接入控制策略对终端进行接入控制,通过本发明,解决了相关技术中存在的需要对不同地址段的用户分别做接入控制,导致接入控制操作繁琐复杂的问题,进而达到了降低对用户进行接入控制操作的复杂度的效果。
Description
本发明涉及通信领域,具体而言,涉及一种接入控制方法、装置及宽带远端接入服务器BRAS。
随着科技的发展,网络已经在人们的生活中占据了不可或缺的地位,并未,不同等级的用户在网络中享受着不同的服务,例如,在校园网项目中,接入设备经常需要针对不同网段的用户进行不同的接入控制,如,对不同网段的用户进行1M\4M\12M等限速以及网络地址转换(Network Address Translation,简称为NAT)等功能。按照通用的处理方式,如果是认证用户,可以通过远程用户拨号认证系统radius服务器分别给每个用户下发策略,以达到对每个用户做限速的目的,该方法虽然可行,但是radius服务器下发属性只能针对单独用户,对一类用户操作起来也只能一条一条添加属性,比较繁琐。另外,如果是不认证的用户,也无法通过radius服务器下发策略。因此,相关技术中的针对需要对不同地址段的用户分别做接入控制,会导致接入控制操作繁琐复杂,工作量大的问题。
针对相关技术中存在的需要对不同地址段的用户分别做接入控制,导致接入控制操作繁琐复杂的问题,目前尚未提出有效的解决方案。
发明内容
本发明实施例提供了一种接入控制方法、装置及宽带远端接入服务器BRAS,以至少解决相关技术中存在的需要对不同地址段的用户分别做接入控制,导致接入控制操作繁琐复杂的问题。
根据本发明实施例的一个方面,提供了一种接入控制方法,包括:获取终端接入网络时携带的网络协议IP地址和携带的服务接入列表SAL信息,其中,所述SAL信息中包括有列表信息,所述列表信息用于确定用于标识所述IP地址和域的对应关系的列表;根据所述IP地址和所述列表确定所述终端接入所述网络时所处的域对应的接入控制策略;根据所述接入控制策略对所述终端进行接入控制。
进一步地,所述列表中至少存储有以下信息:IP地址段、掩码长度、域的域名、IP地址段和域的对应关系。
进一步地,在根据所述终端的IP地址和由所述列表信息所确定的所述列表确定所述终端的接入控制策略之后,还包括:将确定的所述接入控制策略下发给所述终端。
进一步地,所述接入控制策略包括限制所述终端接入网络的限速策略。
进一步地,所述列表包括哈希表。
根据本发明实施例的另一方面,提供了一种接入控制装置,包括:获取模块,设置为获取终端接入网络时携带的网络协议IP地址和携带的服务接入列表SAL信息,其中,所述SAL信息中包括有列表信息,所述列表信息用于确定用于标识所述IP地址和域的对应关系的列表;确定模块,设置为根据所述IP地址和所述列表确定所述终端接入所述网络时所处的域对应的接入控制策略;控制模块,设置为根据所述接入控制策略对所述终端进行接入控制。
进一步地,所述列表中至少存储有以下信息:IP地址段、掩码长度、域的域名、IP地址段和域的对应关系。
进一步地,所述接入控制装置还包括:下发模块,设置为将确定的所述接入控制策略下发给所述终端。
进一步地,所述接入控制策略包括限制所述终端接入网络的限速策略。
进一步地,所述列表包括哈希表。
根据本发明实施例的另一方面,提供了一种宽带远端接入服务器BRAS,包括上述任一项所述的装置。
通过本发明实施例,采用获取终端接入网络时携带的网络协议IP地址和携带的服务接入列表SAL信息,其中,所述SAL信息中包括有列表信息,所述列表信息用于确定用于标识所述IP地址和域的对应关系的列表;根据所述IP地址和所述列表确定所述终端接入所述网络时所处的域对应的接入控制策略;根据所述接入控制策略对所述终端进行接入控制,解决了相关技术中存在的需要对不同地址段的用户分别做接入控制,导致接入控制操作繁琐复杂的问题,进而达到了降低对用户进行接入控制操作的复杂度的效果。
此处所说明的附图用来提供对本发明的进一步理解,构成本申请的一部分,本发明的示意性实施例及其说明用于解释本发明,并不构成对本发明的不当限定。在附图中:
图1是根据本发明实施例的接入控制方法的流程图;
图2是根据本发明实施例的接入控制装置的结构框图;
图3是根据本发明实施例的接入控制装置的优选结构框图;
图4是根据本发明实施例的宽带远端接入服务器BRAS的结构框图;
图5是根据本发明实施例的第一种限速策略的流程图;
图6是根据本发明实施例的第二种限速策略的流程图。
下文中将参考附图并结合实施例来详细说明本发明。需要说明的是,在不冲突的情况下,本申请中的实施例及实施例中的特征可以相互组合。
在本实施例中提供了一种接入控制方法,图1是根据本发明实施例的接入控制方法的流程图,如图1所示,该流程包括如下步骤:
步骤S102,获取终端接入网络时携带的网络协议IP地址和携带的服务接入列表SAL信息,其中,该SAL信息中包括有列表信息,该列表信息用于确定用于标识上述IP地址和域的对应关系的列表;
步骤S104,根据上述IP地址和列表确定终端接入网络时所处的域对应的接入控制策略;
步骤S106,根据接入控制策略对终端进行接入控制。
通过上述步骤,根据终端携带的IP地址确定该终端所属的域,进而根据该域中的接入控制策略对终端进行接入控制,从而无需为每个用户终端均做接入控制处理,解决了相关技术中存在的需要对不同地址段的用户分别做接入控制,导致接入控制操作繁琐复杂的问题,进而达到了降低对用户进行接入控制操作的复杂度的效果。
上述的列表中可以至少存储有以下信息:IP地址段、掩码长度、域的域名、IP地址段和域的对应关系。
在一个可选的实施例中,在根据终端的IP地址和由列表信息所确定的列表确定终端的接入控制策略之后,还可以将确定的接入控制策略下发给终端。终端在接收到接入控制策略后可以保存该接入控制策略,实现对接入控制策略的备份。
上述接入控制策略可以控制多方面内容,在一个可选的实施例中,上述接入控制策略可以包括限制终端接入网络的限速策略,从而依据上述实施例实现对不同IP地址段中的用户施行不同的限速策略,保障用户利益。
上述列表的形式可以为多种,在一个可选的实施例中,上述列表包括哈希表,利用哈希表来存储上述信息。
在本实施例中还提供了一种接入控制装置,该装置设置为实现上述实施例及优选实施方式,已经进行过说明的不再赘述。如以下所使用的,术语“模块”可以实现预定功能的软件和/或硬件的组合。尽管以下实施例所描述的装置较佳地以软件来实现,但是硬件,或者软件和硬件的组合的实现也是可能并被构想的。
图2是根据本发明实施例的接入控制装置的结构框图,如图2所示,该装置包括获取模块22、确定模块24和控制模块26,下面对该装置进行说明。
获取模块22,设置为获取终端接入网络时携带的网络协议IP地址和携带的服务接入列表SAL信息,其中,该SAL信息中包括有列表信息,该列表信息用于确定用于标识IP地址和域的对应关系的列表;确定模块24,连接至上述获取模块22,设置为根据IP地址和列表确定终端接入网络时所处的域对应的接入控制策略;控制模块26,连接至上述确定模块24,设置为根据上述接入控制策略对终端进行接入控制。
其中,上述列表中至少存储有以下信息:IP地址段、掩码长度、域的域名、IP地址段和域的对应关系。
图3是根据本发明实施例的接入控制装置的优选结构框图,如图3所示,该装置除包括图2所示的所有模块外,还包括下发模块32,下面对该装置进行说明。
下发模块32,连接至上述确定模块24,设置为将确定的接入控制策略下发给终端。
上述接入控制策略可以包括限制终端接入网络的限速策略。
上述列表可以包括哈希表。
图4是根据本发明实施例的宽带远端接入服务器BRAS的结构框图,如图4所示,该BRAS 42包括上述任一项的接入控制装置44。
下面以接入控制策略为限速策略、列表为哈希表为例对本发明进行说明。其中,在下述实施例中,通过在服务接入列表(Service Access List,简称为SAL)中增加配置命令,来控制不同ip地址段的用户从不同的域接入,从而对这些不同的域中的用户分别配置限速策略。
图5是根据本发明实施例的第一种限速策略的流程图,如图5所示,该流程包括如下步骤:
步骤S502,在SAL模板下增加配置命令match-address<string>ip-address<ipv4-address/mask-length>domain<domain-name>,通过地址+掩码长度确认地址段,一个SAL模板下,支持最多64个地址段转换域名的条目配置。
步骤S504,用户上线过程中,经过应用接口模块(Application Interface Module,简称为AIM)组件时,AIM获得用户携带的ip地址,以及SAL信息。
步骤S506,检查用户携带的ip地址,如果此ip地址属于某个配置的match-address条目中的地址段,则把该用户映射到相应的域中。
步骤S508,在域的授权模板中,为指定的ip地址段的用户配置相关的限速等策略。
步骤S510,将限速等策略随着用户所在域的授权信息下发给用户。
图6是根据本发明实施例的第二种限速策略的流程图,如图6所示,该流程包括如下步骤:
在操作之前,需要首先在服务接入列表(Service Access List,简称为SAL)模板中增加配置命令,match-address<string>ip-address<ipv4-address/mask-length>domain<domain-name>,通过地址+掩码长度确认地址段,一个SAL模板下,支持最多64个地址段转换域名的条目配置。其中ip地址段用ipv4-address/mask-length获得,domain-name即是属于地址段ipv4-address/mask-length的用户所映射的域。最多配置64条match-address命令,且同一网段或网段有交集的配置不能映射到不同的域。其次,可以以哈希表的形式存储上述操作中配置的网段、掩码长度、域名等信息。哈希表的建立是以掩码长度为索引做冲突连,以网段为键值添加冲突连中节点。
步骤S602,开始。
步骤S604,提取用户ip地址以及SAL信息,其中,可以在用户上线经过应用接口模块(Application Interface Module,简称为AIM)组件时,AIM组件提取用户携带的ip地址以及SAL信息。
步骤S606,查找SAL信息中是否有上述哈希表,如果有,转至步骤S608,否则转至步骤S612。
步骤S608,查看用户携带的ip地址是否属于某个哈希节点中存储的网段中,如果是,转至步骤S610,否则转至步骤S612。
步骤S610,此ip地址属于某个配置的match-address条目中的地址段,则按照配置信息将用户映射到指定域中。
步骤S612,使用用户自带的域。
步骤S614,获取域下绑定的授权模板。
步骤S616,获取授权模板下配置为指定的ip地址段的用户配置的限速等策略。
步骤S618,将授权信息返回给用户。
步骤S620,结束。
在上述实施例中,采用按照ip地址段匹配用户域,并将不同地址段的用户映射到不同的域中去,再通过对不同的用户接入域设置不同的策略的方式,从而有效解决了相关技术中存在的需要对不同地址段的用户分别做接入控制,导致接入控制操作繁琐复杂的问题。
显然,本领域的技术人员应该明白,上述的本发明的各模块或各步骤可以用通用的计算装置来实现,它们可以集中在单个的计算装置上,或者分布在多个计算装置所组成的网络上,可选地,它们可以用计算装置可执行的程序代码来实现,从而,可以将它们存储在存储装置中由计算装置来执行,并且在某些情况下,可以以不同于此处的顺序执行所示出或描述的步骤,或者将它们分别制作成各个集成电路模块,或者将它们中的多个模块或步骤制作成单个集成电路模块来实现。这样,本发明不限制于任何特定的硬件和软件结合。
以上所述仅为本发明的优选实施例而已,并不用于限制本发明,对于本领域的技术人员来说,本发明可以有各种更改和变化。凡在本发明的精神和原则之内,所作的任何修改、等同替换、改进等,均应包含在本发明的保护范围之内。
如上所述,本发明实施例提供的一种接入控制方法、装置及宽带远端接入服务器BRAS具有以下有益效果:采用按照ip地址段匹配用户域,并将不同地址段的用户映射到不同的域中去,再通过对不同的用户接入域设置不同的策略的方式,从而有效地简化了需要对不同地址段的用户分别做接入控制,降低了接入控制操作的繁琐复杂度。
Claims (11)
- 一种接入控制方法,包括:获取终端接入网络时携带的网络协议IP地址和携带的服务接入列表SAL信息,其中,所述SAL信息中包括有列表信息,所述列表信息用于确定用于标识所述IP地址和域的对应关系的列表;根据所述IP地址和所述列表确定所述终端接入所述网络时所处的域对应的接入控制策略;根据所述接入控制策略对所述终端进行接入控制。
- 根据权利要求1所述的方法,其中,所述列表中至少存储有以下信息:IP地址段、掩码长度、域的域名、IP地址段和域的对应关系。
- 根据权利要求1所述的方法,其中,在根据所述终端的IP地址和由所述列表信息所确定的所述列表确定所述终端的接入控制策略之后,还包括:将确定的所述接入控制策略下发给所述终端。
- 根据权利要求1所述的方法,其中,所述接入控制策略包括限制所述终端接入网络的限速策略。
- 根据权利要求1至4中任一项所述的方法,其中,所述列表包括哈希表。
- 一种接入控制装置,包括:获取模块,设置为获取终端接入网络时携带的网络协议IP地址和携带的服务接入列表SAL信息,其中,所述SAL信息中包括有列表信息,所述列表信息用于确定用于标识所述IP地址和域的对应关系的列表;确定模块,设置为根据所述IP地址和所述列表确定所述终端接入所述网络时所处的域对应的接入控制策略;控制模块,设置为根据所述接入控制策略对所述终端进行接入控制。
- 根据权利要求6所述的装置,其中,所述列表中至少存储有以下信息:IP地址段、掩码长度、域的域名、IP地址段和域的对应关系。
- 根据权利要求6所述的装置,其中,还包括:下发模块,设置为将确定的所述接入控制策略下发给所述终端。
- 根据权利要求6所述的装置,其中,所述接入控制策略包括限制所述终端接入网络的限速策略。
- 根据权利要求6至9中任一项所述的装置,其中,所述列表包括哈希表。
- 一种宽带远端接入服务器BRAS,包括上述任一项所述的装置。
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510019235.X | 2015-01-14 | ||
CN201510019235.XA CN105847457A (zh) | 2015-01-14 | 2015-01-14 | 接入控制方法、装置及宽带远端接入服务器bras |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2016112613A1 true WO2016112613A1 (zh) | 2016-07-21 |
Family
ID=56405168
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2015/080604 WO2016112613A1 (zh) | 2015-01-14 | 2015-06-02 | 接入控制方法、装置及宽带远端接入服务器bras |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN105847457A (zh) |
WO (1) | WO2016112613A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114143046A (zh) * | 2021-08-30 | 2022-03-04 | 统信软件技术有限公司 | 一种用户隔离方法、数据传输方法、计算设备及存储介质 |
CN116389173A (zh) * | 2023-06-06 | 2023-07-04 | 明阳时创(北京)科技有限公司 | 一种企业生产网自组网实现方法、系统、介质及设备 |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101040539A (zh) * | 2004-11-30 | 2007-09-19 | 中兴通讯股份有限公司 | 一种ngn网路系统中终端用户漫游控制方法 |
CN101378347A (zh) * | 2008-09-26 | 2009-03-04 | 上海顶竹通讯技术有限公司 | 对终端进行漫游管理以及多场景管理方法 |
CN101437048A (zh) * | 2008-11-11 | 2009-05-20 | 中国移动通信集团北京有限公司 | 一种推送个性化页面的方法和系统 |
US20140236729A1 (en) * | 2008-08-08 | 2014-08-21 | Disney Enterprises, Inc. | System and Method for Real-Time Location-Based Advertisement Insertion into Online Content |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7292592B2 (en) * | 2004-10-08 | 2007-11-06 | Telefonaktiebolaget Lm Ericsson (Publ) | Home network-assisted selection of intermediary network for a roaming mobile terminal |
CN101674268A (zh) * | 2009-09-25 | 2010-03-17 | 中兴通讯股份有限公司 | 接入因特网控制装置及其方法、网关 |
CN103780711B (zh) * | 2012-10-18 | 2017-09-15 | 中国电信股份有限公司 | 接入类型智能判定的地址分配方法、系统及aaa系统 |
-
2015
- 2015-01-14 CN CN201510019235.XA patent/CN105847457A/zh not_active Withdrawn
- 2015-06-02 WO PCT/CN2015/080604 patent/WO2016112613A1/zh active Application Filing
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101040539A (zh) * | 2004-11-30 | 2007-09-19 | 中兴通讯股份有限公司 | 一种ngn网路系统中终端用户漫游控制方法 |
US20140236729A1 (en) * | 2008-08-08 | 2014-08-21 | Disney Enterprises, Inc. | System and Method for Real-Time Location-Based Advertisement Insertion into Online Content |
CN101378347A (zh) * | 2008-09-26 | 2009-03-04 | 上海顶竹通讯技术有限公司 | 对终端进行漫游管理以及多场景管理方法 |
CN101437048A (zh) * | 2008-11-11 | 2009-05-20 | 中国移动通信集团北京有限公司 | 一种推送个性化页面的方法和系统 |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114143046A (zh) * | 2021-08-30 | 2022-03-04 | 统信软件技术有限公司 | 一种用户隔离方法、数据传输方法、计算设备及存储介质 |
CN114143046B (zh) * | 2021-08-30 | 2024-02-23 | 统信软件技术有限公司 | 一种用户隔离方法、数据传输方法、计算设备及存储介质 |
CN116389173A (zh) * | 2023-06-06 | 2023-07-04 | 明阳时创(北京)科技有限公司 | 一种企业生产网自组网实现方法、系统、介质及设备 |
CN116389173B (zh) * | 2023-06-06 | 2023-08-01 | 明阳时创(北京)科技有限公司 | 一种企业生产网自组网实现方法、系统、介质及设备 |
Also Published As
Publication number | Publication date |
---|---|
CN105847457A (zh) | 2016-08-10 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US12034713B2 (en) | Secure authentication for accessing remote resources | |
US10491583B2 (en) | Provisioning remote access points | |
WO2018112944A1 (zh) | 域名解析方法和装置 | |
CN108777699B (zh) | 一种基于物联网多域协同架构下的应用跨域访问方法 | |
WO2015117337A1 (zh) | 网络规则条目的设置方法及装置 | |
WO2015121617A1 (en) | Methods, apparatus and systems for processing service requests | |
JP6119709B2 (ja) | サービスプロバイダ装置、プログラム及びサービス提供方法 | |
CA2945817A1 (en) | Geolocation via internet protocol | |
CN103997479B (zh) | 一种非对称服务ip代理方法和设备 | |
US8887237B2 (en) | Multimode authentication | |
JP2010282596A5 (ja) | 情報処理装置、およびその制御方法、情報処理システム、プログラム | |
US8769623B2 (en) | Grouping multiple network addresses of a subscriber into a single communication session | |
US20160191482A1 (en) | System and method for providing authenticated communications from a remote device to a local device | |
CN105592062A (zh) | 一种保持ip地址不变的方法及装置 | |
CN101483657B (zh) | 一种私网用户对同侧私网设备访问的实现方法及系统 | |
CN104468619A (zh) | 一种实现双栈web认证的方法和认证网关 | |
JP2006180095A (ja) | ゲートウェイ及びWebサーバのアクセス制御方法 | |
WO2016078291A1 (zh) | 共享文件服务器的访问方法、装置及系统 | |
WO2016112613A1 (zh) | 接入控制方法、装置及宽带远端接入服务器bras | |
WO2017080381A1 (zh) | 用于处理跨域数据的方法、第一服务器及第二服务器 | |
US20220021675A1 (en) | Method of using dhcp host name to identify a unique device in absense of unique mac address in order to apply network firewall or access control rules | |
JP2011076506A (ja) | アプリケーションサービス提供システム及びアプリケーションサービス提供方法 | |
CN108123807A (zh) | 宽带网络中用户身份溯源的系统和方法 | |
CN105554084A (zh) | 生成一次性资源地址并与真实资源地址映射的系统及方法 | |
CN107071040B (zh) | 一种基于文件描述符和会话的权限控制方法和系统 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 15877530 Country of ref document: EP Kind code of ref document: A1 |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
122 | Ep: pct application non-entry in european phase |
Ref document number: 15877530 Country of ref document: EP Kind code of ref document: A1 |