Unlock instant, AI-driven research and patent intelligence for your innovation.

Method for identifying physical uniqueness of networked terminal, and access authentication system for terminals

A network access and terminal technology, which is applied in the field of the physical unique identification method of the network access terminal and the terminal access authentication realization system, can solve the problem that the terminal uniqueness verification method is no longer effective, and achieves the effect of small calculation amount

Inactive Publication Date: 2009-07-08
陈相宁
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the expansion of the scale of the LAN and the transformation to the metropolitan area network, it is necessary to provide network services to users with different identities in the increasingly large broadcast network or network broadcast domain. The terminal uniqueness verification method based on cookie exchange has been no longer valid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for identifying physical uniqueness of networked terminal, and access authentication system for terminals
  • Method for identifying physical uniqueness of networked terminal, and access authentication system for terminals
  • Method for identifying physical uniqueness of networked terminal, and access authentication system for terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0051] An embodiment system of the present invention such as figure 1 As shown, it includes a user network access terminal 11, a network access terminal 13, and a transmission link 12 between the user network access terminal 11 and the network access terminal 13, and the user network access terminal 11 includes a user terminal configuration memory inside 111, microprocessor module 112, data transceiving device 113 and random data memory 114, described network access terminal 13 comprises data transceiving device 131, microprocessor module 132, inter-network interface transceiving module 133, network access terminal Configuration memory 134 and login user database module 135 .

[0052] An improved embodiment system of the present invention is as Figure 11 As shown, it includes a user network access terminal 11A, a network access terminal 13A, and a transmission link 12 between the user network access terminal and the network access terminal. The user network access terminal 1...

no. 1 example

[0055] The connection and login process between the user network access terminal 11 and the network access terminal 13 includes such as figure 2 Steps S11-S15 are shown.

[0056] The first step (S11) is to listen to the scheduled broadcast of the network access terminal in order to log in to the network and use the network service. The microprocessor module 132 in the network access terminal 13 takes out configuration parameters such as the broadcast time interval and the current system time from the configuration memory 134, and determines a period of time according to the current network traffic volume as the competition network access time window, and then uses the data transceiver device 131 to broadcast in the clear. The content of the broadcast message 21 includes the determined competition network access time window 213 , timing information 211 determined according to the system time, and other broadcast parameters 214 . After the user terminal 11 receives the broadc...

no. 2 example

[0063] In order to improve the security of the physical uniqueness authentication of the user's network terminal, the following improvements can be made to the connection login process between the user's network terminal 11 and the network access terminal 13, as follows: image 3 Steps S21-S25 are shown.

[0064] The first step (S21) is to listen to the scheduled broadcast of the network access terminal in order to log in to the network and use the network service. The microprocessor module 132 in the network access terminal 13 takes configuration parameters such as the broadcast time interval and the current system time from the configuration memory 134, randomly calculates an initial value of the network key, and determines a period of time according to the current network traffic volume as a competitive network access The time window is then broadcast in plain text through the data transceiver device 131 . The content of the broadcast message 21 includes the initial value ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a physical unique identification method of a network access terminal and a terminal access authentication system, which belong to a method for a user terminal to access a communication service network and an implementation system thereof. The exchange is divided into: the network access terminal broadcasts and competes for the network access time window, the user network access terminal initiates a network access request in the specified time window, the network access terminal broadcasts the terminal login token in cipher text, and the user network access terminal returns the terminal login to the network access terminal Token information, and five steps for the network access terminal to verify the terminal login token information.

Description

technical field [0001] The invention belongs to a method for a user terminal to access a communication service network and an implementation system thereof, in particular to a method for identifying the physical uniqueness of a network access terminal and an implementation system for terminal access authentication for ensuring network communication security. Background technique [0002] With the development of network technology and the rapid expansion of communication networks, network security has increasingly become the focus of attention. The current security threats to the network mainly come from hacker attacks, network defects, software loopholes, and lack of management. Denial of service attacks initiated by network hackers or computer viruses are one of the more difficult to prevent. [0003] Denial of service attack is a kind of network attack: when the communication network is attacked by this form, part or all of it loses the normal service response capability,...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L12/28
Inventor 陈相宁
Owner 陈相宁