Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for certifying authorized charging server to identify client-side software

A technology for authentication, authorization, accounting, and client software. It is used in user identity/authority verification, and key distribution. It can solve the problem of unable to identify the identity and version of client software. Effect

Active Publication Date: 2010-06-23
ZTE CORP
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide a method and device for the authentication, authorization and charging server to identify the client software, so as to solve the problem in the prior art that the authentication, authorization and charging server cannot identify the identity and version of the client software used when the user logs in. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for certifying authorized charging server to identify client-side software
  • Method and device for certifying authorized charging server to identify client-side software
  • Method and device for certifying authorized charging server to identify client-side software

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0050] According to another specific embodiment, such as image 3 Shown, method described in the present invention comprises the following steps:

[0051] Step 31, when the user uses the client software to perform broadband access authentication, the client software pre-sets a private encryption algorithm shared with the AAA server before sending the password to the BAS server, and uses the private encryption algorithm to encrypt the password. Revise;

[0052] Step 32, the client software constructs a corresponding message to the modified password according to the authentication protocol (EAP, CHAP, etc.) and access protocol (PPPoE, EAPoL, etc.) used to interact with the BAS server and sends it to the AAA server;

[0053] Step 33, on the AAA server side, before verifying the password, use various private encryption algorithms to process the password;

[0054] Step 34, match the modified password received by the AAA server from the client software with the passwords processed...

specific Embodiment approach

[0068] According to another specific implementation manner, the password modification unit 711 is configured to use various private encryption algorithms to process the password before the AAA server verifies the password;

[0069] The password matching unit 712 is used to match the modified password received by the AAA server from the client software with the passwords processed by the password modification unit 711 using various private encryption algorithms to obtain a matching result, and match the password The result is sent to the instruction unit 713; when a correct match is found, it is determined that the client software version is the client software version corresponding to the corresponding private encryption algorithm, and the client software version is sent to the instruction unit 713; When no correct match is found, match the password received by the AAA server with the unmodified original password to obtain the original matching result, and send the original mat...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The method includes following st4ps: (1) using preset private encryption algorithm modifies cipher; (2) software at client end constructs corresponding message, and sends it to authenticating, authorizing and charging server end (AACS); (3) using the said private encryption algorithm modifies cipher; (4) carrying out matching between modified cipher from client end software received by AACS end and modified cipher at AACS end; if both are matched, then, validating ID of client end software utilized when user logs on. The device includes AACS, module for modifying cipher, and module for sending cipher. The invention solves issues that in current technique, AACS is unable to identify ID and version of client end software when user logs on.

Description

technical field [0001] The present invention relates to the authentication technology in broadband access, and more particularly relates to a method and a device for identifying client software by an authentication, authorization, and accounting server. Background technique [0002] With the continuous popularization of the network, the broadband access technology has been well developed, people's demand for the network is increasing, and the broadband access service has a broad market. However, while providing broadband access services to broadband users, in order to ensure network security (to prevent viruses and Trojan horses from spreading on the network) or to ensure the rights and interests of fixed network operators (to prevent users from sharing the Internet), it is necessary to embed removal Some additional functions besides authentication access, such as detecting whether the operating system environment where the client software runs has anti-virus software and a ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/08
Inventor 赵宇潘大乾李锋
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More