The present application claims priority from Japanese application JP 2004-010011 filed on Jan. 19, 2004, the content of which is hereby incorporated by reference into this application.
The present invention relates to access user management for broadband Internet connections.
User authentication is very important technologies in order to ensure securities of network communications. PPPoE (Point-to-Point Protocol over Ethernet) (“Ethernet” is a registered trademark) is currently used widely for access user authentication and access user state management in broadband Internet connections. PPPoE has been developed from PPP used for dial-up connections and made usable on the Ethernet, can authenticate users at Layer 2 by using an authentication protocol, and can monitor a user connection state by periodically requesting user re-authentication or by using an LCP Echo packet. The PPPoE technologies are disclosed in RFC2516: A Method for Transmitting PPP Over Ethernet (PPPoE).
Another authentication uses the communication standards called IEEE802.1x. This method authenticates in the unit of port at Layer 2 and is presently used often for local wireless connection authentication. User authentication is possible at Layer 2 by using the authentication protocol, and a user connection state can be monitored by periodically requesting for user re-authentication. An example of the user terminal authentication method using the communication standards of IEEE802.1x is disclosed in Japanese Patent Laid-open Publication No. JP-A-2003-224577. The communication standards are shown in IEEE802.1X-2001: IEEE Standards for Local and Metropolitan Area Networks: Port-Based Network Access Control, Section 6, pp. 7-13.
The above-described two authentication methods can perform user management at Layer 2. Authentication of access users can be performed by using a combination of a policy routing function which is generally built in recent routers and authentication at an application layer level by the World-Wide-Web (Web). According to this authentication method, an access server (router) directly connecting an access user at Layer 3 is set so that a user can access only a particular Web sever at the initial connection stage by using the policy routing function. The Web browser is subjected to authentication after a user connection, and the Web server again sets the access server so that only the IP address of the authenticated user is ordinarily routed.
With reference to
At this point, policy routing is set by the access server 3 for the IP address assigned to the terminal 5 so that the terminal 5 cannot access freely the Internet 7. An Internet access S105 from the application 504 and an Internet access S106 from the Web browser 501 fail. A cross symbol shown in
In the description with reference to FIGS. 2 and 3, the access server 3, Web server 1, authentication server 2 and DHCP server 4 are shown as discreet for the purposes of simplicity. However, these servers may be combined into smaller number of units as desired if they are equivalent in functions. Although DHCP is used as an example of IP address assignment, an optional method may be used for IP address assignment. For example, RA (Router Advertisement) may be used if the IP protocol is IPv6. Although the Web browser explicitly accesses the Web server 1 at Steps S106 and S107, Steps S106 and S107 may be changed to a continuous sequence by using a redirect function of the Web server.
PPPoE has an inferior communication efficiency because of addition of a PPP header and a PPPoE header, and has a limitation that the multicast function inherent to Ethernet cannot be used. Further, since PPPoE is the communication protocol at Layer 2, it is necessary for an access sever directly connected an access user at Layer 3 level to have the PPPoE function, resulting in a high cost of the access sever.
IEEE802.1x is the communication standards at Layer 2 similar to PPPoE although it has no limitation of the communication efficiency and multicast function. It is therefore necessary to mount a function corresponding to IEEE802.1x on the access server, resulting in a high cost of the access server.
The user authentication method combining policy routing and web authentication has no means for monitoring a user connection state. An access to the Internet by a user means that a particular network resource (e.g., an IP address assigned to a user via DHCP, etc) is assigned to the user, as viewed from an ISP (Internet Service Provider). With the present Web authentication method, it cannot be known whether a user assigned a network resource is presently connected to the Internet. Since network resources such as IPv4 addresses are limitative, it is not practical to make resources being assigned to a disconnected user. To overcome this, the access server 1 monitors data packet passing, and if a time-out comes, it is considered that the user is disconnected. The user IP address is set again so that it can access only the Web server, and when the user operate again the Web browser, re-authentication is requested.
With reference
It is therefore an object of the present invention to provide a novel Web authentication method and a Web authentication apparatus capable of providing the authentication method, the method and apparatus being capable of solving two issues; an issue that a conventional Web authentication method cannot grasp a user connection state and an issue that a user is required to perform a complicated task of repeating a re-authentication procedure.
The problem associated with the authentication method combining policy routing and Web authentication resides in that a Web browser unable to operate autonomously is used as the framework of authentication on the terminal side.
The present invention is therefore characterized in that in place of a conventional authentication Web server, a server is provided which has a function of confirming a user connection state and a function of transmitting a request of changing the policy of policy routing or a release request of releasing the current policy, to an access server in accordance with the confirmed user connection state. A client function capable of communicating with the server is installed on the terminal side. When it is confirmed that the user is disconnected, the access server inhibits the user from freely accessing the Internet.
When the terminal starts an access to the Internet, initial authentication is performed by using the client function in place of a Web browser. The client function mounted on the terminal is required to respond in the background relative to a connection confirmation request from the server. It is therefore possible for the terminal to maintain a connection state, without repeating the re-authentication by the user.
The above-described server and client may be dedicated to user management, or they may be a server for already existing applications having similar functions, the server provided with an access server setting function. An example of an already existing application is typically Instant Messenger (IM), which is presence awareness software for opening a user terminal use state to particular or unspecific users on the network, or a mail server (MTA) and a mail client (MUA), or the like.
As the server, one server may be provided with an authentication function possessed by a conventional authentication server and a function of transmitting a request of changing a policy of policy routing. Alternatively, a combination of a presence awareness server and a conventional authentication server may be used.
The server may send a re-authentication request to the terminal, instead of the connection confirmation request. In this case, however, a client mounted on the terminal is required to have a function of responding to the re-authentication request from the server in the background. The terminal periodically connects the server via the mounted client function to execute the re-authentication operation.
According to the present invention, without using a special access server capable of dealing with PPPoE and IEEE802.1x, it is possible to properly manage a user connection state and properly distribute resources such as an IP address to users.
Other objects, features and advantages of the invention will become apparent from the following description of the embodiments of the invention taken in conjunction with the accompanying drawings.
In the first embodiment, IM is used by way of example as an application which can acquire information of the network connection state of a user terminal. With reference to
Upon reception of the acknowledgement packet from the authentication server 2, the IM server 8 transmits a release request packet for releasing policy routing or a change request packet for requesting for a change in a routing control policy used by policy routing, to the access server 3 (S128). Therefore, the packet having the address of the terminal 5 as an address of a transmission source can be transmitted to any partner on the Internet 7 from the terminal 5 via the application 504, because the setting conditions of routing control set by the access server 3 are released or changed (S129). The IM client 503 can also access another IM server on the Internet 7 (S130).
After the authentication succeeds, the IM server 8 periodically transmits authentication confirmation or existence confirmation to the IM client 503 (S131). In response to this, the IM client returns an authentication request or an existence notice (S132). The IM server 8 can therefore confirm that the terminal 5 is in continuous communications. The user can access the Internet during the operation of the terminal, without performing a re-authentication operation.
Consider now that the terminal 5 stops at S134. Although the IM server continues to send authentication confirmation or existence confirmation, a response will not be returned because the terminal stops (S133). If this repeats a predetermined number of times, the IM server judges that the terminal is disconnected, makes the access server 3 perform the settings of policy routing relative to the IP address of the terminal 5 (S135). When the access server completes the settings at S136, the Internet resource assigned to the terminal 5 is released so that it can be used by another terminal.
Although the access server 3, IM server 8, authentication server 2 and DHCP server 4 are all discreet as described above, an optional combination of these servers may be used if it is functionally equivalent similar to conventional examples. A combination of the access server 3 and IM server 8 among others is effective for settings in the unit of port. A proxy server function provided in the access server as an alternative of communications between the IM server and terminal is effective for settings in the unit of port. Although DHCP is used as an example of IP address assignment, any IP address assignment method may be used.
With reference to the accompanying drawings, an embodiment of the present invention will be described. This embodiment differs from the first embodiment in that the Web server 1 similar to the conventional example can be used as an application server connected to the authentication server.
Consider now that the terminal 5 stops at S149. Since the terminal stops, authentication information cannot be transmitted (S151). If this state continues during a time-out period S150, the access server judges that the terminal is disconnected and performs the settings of the policy routing relative to the IP address of the terminal 5 (S152). When the settings at the access server are completed at S152, Internet resources are released for the terminal 5 so that they can be used by another terminal. In this example, although the time-out is set on the side of the access server 3, the time-out management may be performed by the authentication Web server 1, and at the time-out, the authentication Web server 1 makes the access server 3 to perform the settings of the policy routing.
It should be further understood by those skilled in the art that although the foregoing description has been made on embodiments of the invention, the invention is not limited thereto and various changes and modifications may be made without departing from the spirit of the invention and the scope of the appended claims.
Number | Date | Country | Kind |
---|---|---|---|
2004-010011 | Jan 2004 | JP | national |