Method for realizing network certification

An implementation method, a technology of network authentication, applied in the field of network authentication, can solve the reasons of not providing users with authentication failure or offline, unfavorable 802.1x client usability, operation service provider and user authentication failure or offline Misunderstanding

Inactive Publication Date: 2007-11-21
ZTE CORP
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] It can be seen from this process that when the 802.1x authentication fails or the client goes offline in violation of the server security policy, there is currently no authentication failure or logout information provided to the user. This makes it difficult for users to easily and intuitively know the reasons for authentication failures or violations of specific security policies, which is not conducive to the ease of use of 802.1x clients; on the other hand, it will also cause conflicts between operators and users. Misunderstanding of reasons for certification failure or offline

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing network certification
  • Method for realizing network certification
  • Method for realizing network certification

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] The present invention will be described in detail below in conjunction with the accompanying drawings.

[0040] The present invention expands the existing EAP Notification message, and transmits the reason of authentication failure or offline to the 802.1x client through the data field in the message. In order to distinguish various authentication failure reasons, set an error code Code value, and define seven types of values ​​for the failure reasons. For example, the Code value is 1, indicating that the user name is incorrect; the Code value is 2, indicating that the user password is incorrect; Code A value of 3 means that the user has violated the security policy of the server and there is an agent on the client side; a value of Code of 4 means that the user has violated the security policy of the server and performed some illegal operations; a value of Code of 5 means that the user has been offline within a time limit; A value of 6 indicates that the traffic limit i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention is used for providing a reason of authentication failure for user when user fails to pass through the authentication and is off-lined. It comprises: before user fails to pass through the authentication and is off-lined, the server sends its reason to the 802.1x apparatus; 802.1x apparatus places the reason code in the expanded identification protocol notice message, and sends the message to the 802.1x client side.

Description

technical field [0001] The invention relates to a method for realizing network authentication, in particular to a method for realizing network authentication of 802.1x protocol. Background technique [0002] The 802.1x protocol is a port-based network access control protocol. It is a standard defined by IEEE to solve port-based network access control (Port-Based Network Access Control). The architecture of 802.1x is shown in Figure 1, including: [0003] Requester (client) 1 - the user / device requesting authentication; [0004] Authenticator (authentication system) 2—the port that authenticates the accessed user / device; each physical port of the Ethernet is divided into two logical ports that are controlled and uncontrolled, and each physical port receives Frames are sent to both controlled and uncontrolled ports. Access to the controlled port is limited by the authorization status of the controlled port. The authenticator's PAE (Port Access Entity) controls the authorize...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 黄小华严峰毛羽
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products