Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for implementing network access authentication

A network access and network technology, applied in the field of network access authentication

Inactive Publication Date: 2009-09-23
LENOVO (BEIJING) LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] With the development of e-commerce, e-commerce has been more and more integrated into people's lives. In e-commerce, such as in e-auctions, e-elections and other activities, users usually do not want to expose themselves when they use access devices to access the network. It can be seen that the existing network access authentication methods cannot meet this requirement at all.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for implementing network access authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0032] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0033] There are certificate issuing entities, certificate revocation entities, access devices and network access authentication devices in the network. Among them, the certificate issuing entity has an issuing module responsible for issuing anonymous qualification certificates to legal access devices; the certificate revocation entity has a revocation module for revoking the legal qualification of access devices; A certification module used to prove the legality of the self-identity; a verification module used to verify whether the access device is legal exists in the network access authentication device used to verify the legality of the access device. The above-mentioned certificate issuing entity and certificate revocation entity may be the same physical entity or different physical entities.

[0034] figure 1 Shown is a schematic flow chart of implemen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing network access authentication, the key of which is that in the access request sent by the access device to the network access authentication device, the encryption public key pair of the anonymous qualification certificate and the access The information encrypted together with the identity of the access device, and the zero-knowledge proof information proving the legality of the anonymous qualification certificate; the network access authentication device confirms that the anonymous qualification certificate applied by the access device has not been revoked according to the received information, and verifies After the zero-knowledge proof is correct, the access device is considered legal and the access device is allowed to access the network. Applying the present invention, the network access authentication device can confirm the legitimacy of the access device without knowing the real identity of the access device. In this way, it not only ensures the security of the device accessing the network, but also hides the identity of the access device. identity of. Therefore, the access device is anonymous and unconnectable, which meets the user's requirements.

Description

technical field [0001] The invention relates to the technical field of network access authentication, in particular to a method for realizing network access authentication. Background technique [0002] At present, the network access authentication device performs authentication processing on devices to be connected to the network mainly based on the following technical protocols: [0003] (1) Password authentication protocol; [0004] (2) Based on the shared key and challenge response protocol; [0005] (3) Based on the dynamic one-time password protocol; [0006] (4) Authentication protocol based on public key system. [0007] The idea of ​​all the above authentication processing is: network access authentication devices, such as firewalls, routers, authentication servers, etc., determine whether the access is allowed by judging whether the device to be accessed has the password and / or key required by the authentication protocol Device access. Applying the above acces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L12/28H04L9/08
Inventor 陈军韦卫曲亚东尹萍
Owner LENOVO (BEIJING) LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products