An authentication method and system
An authentication method and authentication system technology, applied in the field of authentication methods and systems, can solve problems such as increased failure, occurrence, increased equipment cost and network complexity, and achieve the effects of saving costs, reducing workload, and enhancing flexibility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0054] The core idea of the present invention is to divide the VLAN under the controlled port of the authentication device into two kinds of virtual VLANs: controlled VLAN and uncontrolled VLAN. Among them, for the controlled VLAN, it is forbidden to send any message in the unauthorized state without authentication, and the data message can be transmitted in the authorized state; for the uncontrolled VLAN, the data message is always allowed to pass.
[0055] Such as Figure 4 As shown, an authentication method of the present invention includes the following steps:
[0056] Step s401, configuring the authentication device and its controlled ports.
[0057] Specifically, the authentication device is configured to have an authentication function, and its port is configured as a controlled port with the authentication function.
[0058] Step s402, configuring a VLAN under the controlled port.
[0059] Configure the VLAN under the controlled port. The controlled port is furthe...
PUM

Abstract
Description
Claims
Application Information

- R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com