Secondary authentication method and system
A secondary authentication and access authentication technology, applied in the transmission system, user identity/authority verification, data exchange details, etc. fees and other issues
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0052] The purpose of the present invention is to provide a method that can distinguish the user's access area, that is, the internal and external network. The user performs a corresponding authentication method according to the needs of accessing resources, that is, provides the user with a mode that can choose the secondary authentication: if the user chooses to only authenticate the internal Internet only needs to complete the 802.1x authentication; or at the same time to authenticate the requirements of the internal and external network, the client will automatically complete the secondary authentication, that is, sequentially perform 802.1x and WebPortal authentication, and send the Portal authentication page to the user after successful 802.1x authentication for Portal authentication , and then the authentication server can distinguish the resource access of the user according to the IP address of the access device NAS of the 802.1x authentication of the internal network a...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com