Unlock instant, AI-driven research and patent intelligence for your innovation.

System and method of network access authentication

A network access and network-side technology, applied in the transmission system, user identity/authority verification, electrical components, etc., can solve the problems of reducing the security of the NEA system, and achieve the effect of enhancing security and improving operating efficiency

Inactive Publication Date: 2010-12-15
HUAWEI TECH CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] However, the above-mentioned NEA system only establishes a trust relationship between entities of the same level belonging to the end point side and the network side, that is, between the proxy client module 112 and the proxy server module 122 and between the information collection module 111 and the information evaluation module. A direct trust relationship has been established between the modules 121, but no trust relationship has been established between entities of different levels, such as between the information collection module 111 and the proxy client module 112 and between the information evaluation module 121 and the proxy server module 122. Therefore, the proxy client module 112 may send the system information obtained by the information collection module 111 to the network side without establishing a trust relationship with the information collection module 111, causing the end user to obtain information from the information collection module 111. What information is not known, which reduces the security of the NEA system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method of network access authentication
  • System and method of network access authentication
  • System and method of network access authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0050] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0051] In the embodiment of the present invention, by adding a direct trust relationship between the information collection module and the proxy client module of the network endpoint evaluation system, and between the information evaluation module and the proxy server module on the network side, and deleting the direct trust relationship established between the information collection module and the information evaluation module Trust relationship, so as to ensure that the behavior of each entity conforms to the requirements of the NEA framework, and enhance the security and operational efficiency of the NEA system.

[0052] figure 2 It is a schematic diagram of establishing a trust relationship among entities in the network access authentication system...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The example of the invention discloses a process of network switch-in identification, which comprises building up the direct trusting relationship between an acting user side module of an endpoint side unit and an acting server module of a network side unit, building up the direct trusting relationship between an information collection module of the endpoint side unit and an information estimation module of the network side unit, establishing the direct trusting relationship between the information collection module and the acting user side module, and or establishing the direct trusting relationship between the information estimation module and the acting server module. The operation case of the invention further discloses a system of network switch-in identification, which comprises theacting user side module, the information collection module, the acting server module and information estimation module, and is further provided with an acting user side module and an information collection module, and or the direction trusting relationship between the information estimation module and the acting server module. The actions of each noumenon are guaranteed to correspond with the requests of the network terminal estimation system architecture through applying the invention, and the system security can be increased.

Description

technical field [0001] The invention relates to network authentication technology, in particular to a method and system for network access authentication. Background technique [0002] With the rapid development of the Internet in the world and the wide application of the Transmission Control Protocol / Internet Protocol (TCP / IP, Transfer Control Protocol / Internet Protocol) in the network, while the Internet brings convenience to people, its insecurity is also becoming more and more serious. Seriously, due to the open architecture of TCP / IP technology and the security flaws of the protocol itself, most attacks, such as viruses, worms, and hacker attacks, are based on the TCP / IP protocol. Internet security issues mainly include: Security protection of the system and computer network itself; security protection of communication and distributed application systems based on computer networks. [0003] The purpose of the Network Endpoint Assessment (NEA, Network Endpoint Assessmen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 尹瀚位继伟
Owner HUAWEI TECH CO LTD