{"title":"控制用户访问Internet的多功能系统的开发","authors":"Arseniy D. Prosvirin, Vadim V. Davydov, A. Moroz","doi":"10.1145/3440749.3442618","DOIUrl":null,"url":null,"abstract":"Today nearly everyone needs strong and reliable access to the Internet. Usually, such access is provided by Internet-providers. They lay lines of communication and hire specialists. This costs money so customers should pay for the access. Accordingly, the provider wants to distinguish between clients who paid for access and those who do not. That is why providers require methods to control access with usage of authentication. Sometimes, one provider gets hardware of another provider under own control. However, there are a lot of different authentication protocols developed. The target of that work is to connect such authentication methods on hardware with providers services, such as user access control panel (billing). The result of the work is development of running software which can control users’ authentication depending on rules applied in billing panel.","PeriodicalId":344578,"journal":{"name":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","volume":"553 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2020-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Development of multifunctional system for controlling user access to the Internet\",\"authors\":\"Arseniy D. Prosvirin, Vadim V. Davydov, A. Moroz\",\"doi\":\"10.1145/3440749.3442618\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Today nearly everyone needs strong and reliable access to the Internet. Usually, such access is provided by Internet-providers. They lay lines of communication and hire specialists. This costs money so customers should pay for the access. Accordingly, the provider wants to distinguish between clients who paid for access and those who do not. That is why providers require methods to control access with usage of authentication. Sometimes, one provider gets hardware of another provider under own control. However, there are a lot of different authentication protocols developed. The target of that work is to connect such authentication methods on hardware with providers services, such as user access control panel (billing). The result of the work is development of running software which can control users’ authentication depending on rules applied in billing panel.\",\"PeriodicalId\":344578,\"journal\":{\"name\":\"Proceedings of the 4th International Conference on Future Networks and Distributed Systems\",\"volume\":\"553 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2020-11-26\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 4th International Conference on Future Networks and Distributed Systems\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3440749.3442618\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 4th International Conference on Future Networks and Distributed Systems","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3440749.3442618","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Development of multifunctional system for controlling user access to the Internet
Today nearly everyone needs strong and reliable access to the Internet. Usually, such access is provided by Internet-providers. They lay lines of communication and hire specialists. This costs money so customers should pay for the access. Accordingly, the provider wants to distinguish between clients who paid for access and those who do not. That is why providers require methods to control access with usage of authentication. Sometimes, one provider gets hardware of another provider under own control. However, there are a lot of different authentication protocols developed. The target of that work is to connect such authentication methods on hardware with providers services, such as user access control panel (billing). The result of the work is development of running software which can control users’ authentication depending on rules applied in billing panel.