Network authorization method

A technology of network authentication and authentication equipment, applied in the network field, can solve problems such as hidden dangers of network resource security, uncontrollable resource access rights, loss of campus network management departments, etc., and achieve the effect of ensuring security

Active Publication Date: 2007-10-03
ZTE CORP
View PDF0 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, after network users use the shared Internet access technology, the resource access rights in the network become uncontrollable, which brings security risks to network resources, and avoids billing. Campus network administration takes a big toll

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network authorization method
  • Network authorization method
  • Network authorization method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050]FIG. 3 is a schematic diagram of the format of an EAPoL (Extensible Authentication Protocol over Local Area Network) packet and an EAPoL-Key (keyword of the Extended Authentication Protocol over Local Area Network). EAPoL packet consists of destination MAC address, source MAC address, Ethernet PAE packet type (PAE packet value is 2), EAP protocol version number (0x01), packet type (as shown in Figure 4, this field is used to indicate packet The transmitted data type, such as the transmitted data type is EAP-Key (extensible authentication protocol key type), value 3), packet length (not including the header data of the packet) and packet data and other fields. As shown in Figure 3, the packet data among the present invention is filled by the data format of EAPoL-Key: Descriptor Type (descriptor type: adopt RC4 encryption as Key data, then take value 1), Key Length (keyword data length) , Replay Counter (retransmission counter), Key IV (keyword random data), Key index (key...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A authentication method of network includes carrying out authentication on user device by authentication device according to 802.1x certification flow, sending EAP-key data message containing agent detection policy information to user device by certification device for starting up agent detection on user device if said certification is passed and receiving EAP-key data message contained with agent detection result information and sent from user device by authentication device.

Description

technical field [0001] The invention relates to network technology, in particular to a network authentication method combining agent detection technology and authentication technology. Background technique [0002] With the rapid development of Internet (Internet) and Intranet (Local Area Network), as a bridge connecting the Internet and Intranet, shared Internet access technology plays an extremely important role in practical applications. However, after network users use the shared Internet access technology, the resource access rights in the network become uncontrollable, which brings security risks to network resources, and avoids billing. The campus network administration has taken a big toll. [0003] 802.1x is a standard defined by IEEE to solve port-based access control (Port-Based Network Access Control). The architecture of 802.1x is shown in Figure 1, including: [0004] Requester (client) 1 - the user / device requesting authentication; [0005] Authenticator (a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 黄小华卢应华蒋勇
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products