Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, authentication system and authentication device

An authentication method and authentication system technology, applied in the fields of authentication methods, authentication systems and authentication devices, can solve the problems of reducing security, long re-authentication time, and increasing the burden of authentication servers, and achieve the effect of reducing the burden.

Active Publication Date: 2011-02-02
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0032] However, the re-authentication process of Scheme 2 is the same as the first-time authentication process, which leads to the following problems: first, it increases the burden on the authentication requester; second, the large number of messages and frequent interactions increase the burden on the network; third, 1. The number of messages is large and the number of interactions is frequent, resulting in a long re-authentication time; Fourth, the burden on the authentication server is increased. Generally speaking, the authentication server manages a large number of users at the same time. Originally, it was only when users went online and offline. The participation of the authentication server is required when re-authentication is adopted. Assuming that the re-authentication timer is 30 seconds, the user needs to be authenticated every 30 seconds, and the authentication server may be overwhelmed.
[0040] In this solution, a device authentication server agent is added. Adding a device in the network increases the complexity of the network, and also reduces the security. When the authentication server agent is connected to multiple APs or authenticators, the same will happen. Overburdening the authentication server agent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, authentication system and authentication device
  • Authentication method, authentication system and authentication device
  • Authentication method, authentication system and authentication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0076] The present invention will be described in detail below with reference to the accompanying drawings and in combination with embodiments.

[0077] Figure 5 A schematic diagram showing an authentication system according to an embodiment of the present invention, including: an authentication requester 10, used to initiate an authentication request; an authenticator 20, used to provide an access service to the authentication requester, if the authentication requester initiated authentication The request is the first authentication request, forwarded to the authentication server processing of the information about the authentication requester stored, if it is a second authentication request, then local processing; authentication server 30, which is used to authenticate the first authentication request, and after the authentication is successful, will The authentication information of the authentication requester is notified to the authenticator.

[0078] Figure 6 A flowc...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method, which comprises the following steps that: an authentication requester firstly sends an authentication request to an authenticator who provides access service; the authenticator forwards the sending first-time authentication request to an authentication server which storages the information of the authentication requester; the authentication server informs the authenticator about the authentication information of the authentication requester after the successful authentication of the first-time authentication request; when the authentication requester sends the authentication request again, the authenticator utilizes the authentication information to carry out the local authentication of the authentication requester. The invention further provides an authentication system and an authentication device.

Description

technical field [0001] The present invention relates to the communication field, and more specifically, to an authentication method, an authentication system and an authentication device. Background technique [0002] With the rapid development of the Internet (Internet), broadband access technologies emerge in an endless stream, among which Ethernet gradually occupies most of the broadband access market because of its high performance-cost ratio. A personal computer can be connected to an Ethernet switch through a wired method, or connected to a wireless access point (Access Point, referred to as AP) through a wireless method, and then connected to a core network through an Ethernet line, such as an enterprise LAN or a metropolitan area network, etc. However, the traditional Ethernet access method lacks manageability and cannot implement functions such as user authentication, authorization, and accounting. Operators can only use monthly subscriptions to bill users, which i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L29/06H04L12/28
Inventor 吴国敏
Owner HUAWEI TECH CO LTD