Supercharge Your Innovation With Domain-Expert AI Agents!

An authentication method and system

An authentication method and authentication system technology, applied in the field of authentication methods and systems, can solve problems such as increased failure, occurrence, increased equipment cost and network complexity, and achieve the effects of saving costs, reducing workload, and enhancing flexibility

Inactive Publication Date: 2008-04-23
NEW H3C TECH CO LTD
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] When using the above method, there are the following problems: the method of adding an access layer switch increases equipment cost and network complexity; and the method of configuring static MAC in the aggregation layer switch can be used when the number of special users is small and fixed, otherwise It will greatly increase the workload of network management and increase the probability of failure

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication method and system
  • An authentication method and system
  • An authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0054] The core idea of ​​the present invention is to divide the VLAN under the controlled port of the authentication device into two kinds of virtual VLANs: controlled VLAN and uncontrolled VLAN. Among them, for the controlled VLAN, it is forbidden to send any message in the unauthorized state without authentication, and the data message can be transmitted in the authorized state; for the uncontrolled VLAN, the data message is always allowed to pass.

[0055] Such as Figure 4 As shown, an authentication method of the present invention includes the following steps:

[0056] Step s401, configuring the authentication device and its controlled ports.

[0057] Specifically, the authentication device is configured to have an authentication function, and its port is configured as a controlled port with the authentication function.

[0058] Step s402, configuring a VLAN under the controlled port.

[0059] Configure the VLAN under the controlled port. The controlled port is furthe...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

This invention discloses an authentication method including the following steps: when a controlled port of an authentication device receives a message sent by an exchange device, it gets the kind of the message and VLAN of the terminal transmitting the message, then the device processes the message based on the kind, the VLAN and preset attribute of VLAN. This invention also discloses an authentication system.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an authentication method and system. Background technique [0002] The way for users to access the LAN has evolved from the initial unprotected network access to simple Mac address binding, and now adopts PPPoE (Point to Point Protocol over Ethernet, Ethernet point-to-point protocol), Web, VPN (Virtual Private Network, virtual private network), wireless network WEP (Wireless Encryption Protocol, wireless encryption protocol), 802.1X authentication and other diversified access access systems, its security, efficiency and convenience have also been developed and improved rapidly . Due to various defects in the access control of PPPoE in the pure Ethernet environment, IEEE (Institute of Electrical and Electronics Engineers, Institute of Electrical and Electronics Engineers) officially promulgated the IEEE 802.1X standard in 2001, which is a port-based network interfa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L12/56H04L47/76
Inventor 彭琳
Owner NEW H3C TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More