Network authentication method, system and apparatus

A technology of network authentication and authenticator, applied in the field of authentication, can solve the problems of not supporting EAP-MD5 authentication, the whole network is paralyzed, and protecting the unfavorable investment of network operators, so as to avoid network problems and protect network investment

Inactive Publication Date: 2012-05-23
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The AAA servers in most existing networks only support CHAP authentication and do not support EAP-MD5 authentication. If the existing networks that only support CHAP authentication can implement EAP-MD5 authentication, the AAA server must be replaced to support EAP-MD5 authen

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network authentication method, system and apparatus
  • Network authentication method, system and apparatus
  • Network authentication method, system and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0027] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments.

[0028] The embodiment of the present invention mainly introduces an AAA proxy device between the authenticator and the AAA server to realize the conversion between EAP-MD5 authentication and CHAP authentication carried by the AAA protocol, so that it does not need to change the AAA server of the original network, but also Support new network terminals that support EAP-MD5 authentication.

[0029] figure 2 It is a structural diagram of an EAP-MD5 authentication system according to an embodiment of the present invention;

[0030] As shown in the figure, the authentication system includes: an AAA proxy device 203 and an AAA server 204;

[0031] Among them, the applicant 201 supports EAP-MD5 authentication; the authenticator 202 supports EAP-MD5 authentic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network authentication method. AAA proxy device is introduced between authenticator and AAA server to acquire user name of applicator in EAP-MD5 style and randomly generate MD5 challenge word; user password is acquired in EAP-MD5 style; the acquired user name, challenged user password and randomly generated MD5 challenged word are submitted to AAA server for authentication in CHAP style; authentication result of CHAP style returned by AAA server is received and converted to EAP-MD5 style to notify applicator so that network supports new EAP-MD5 authentication withoutmodifying original network AAA server. The invention also discloses a network authentication system and AAA proxy device.

Description

technical field [0001] The invention relates to the technical field of authentication, in particular to a network authentication method, system and device. Background technique [0002] Currently, in an existing network requiring authentication, a Challenge Handshake Authentication Protocol (CHAP, Challenge Handshake Authentication Protocol) is usually used to authenticate network users. The basic process of CHAP authentication is: the authenticator in the network first sends a random challenge message to the user, and the user uses the one-way hash (HASH) function to calculate the response value based on the challenge message and the shared key information, and then sends it to The authentication server, the authentication server also performs the same calculation, and verifies whether its own calculation result is consistent with the received response value; if it is consistent, the authentication passes, otherwise the authentication fails. The advantage of this authentic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04L29/06
Inventor 郑若滨
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products