Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network authentication method, system and apparatus

A technology of network authentication and authenticator, applied in the field of authentication, can solve the problems of not supporting EAP-MD5 authentication, the whole network is paralyzed, and protecting the unfavorable investment of network operators, so as to avoid network problems and protect network investment

Inactive Publication Date: 2012-05-23
HUAWEI TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The AAA servers in most existing networks only support CHAP authentication and do not support EAP-MD5 authentication. If the existing networks that only support CHAP authentication can implement EAP-MD5 authentication, the AAA server must be replaced to support EAP-MD5 authentication. AAA server, and the AAA server is the heart of the network, replacing the AAA server may lead to the paralysis of the entire network; moreover, the cost of replacing the AAA server is quite high, which is quite unfavorable for protecting the investment of network operators

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network authentication method, system and apparatus
  • Network authentication method, system and apparatus
  • Network authentication method, system and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below with reference to the accompanying drawings and examples.

[0028] The embodiment of the present invention mainly introduces an AAA proxy device between the authenticator and the AAA server to realize the conversion between EAP-MD5 authentication and CHAP authentication carried by the AAA protocol, so that the AAA server of the original network does not need to be changed, and the Support new network terminals that support EAP-MD5 authentication.

[0029] figure 2 It is a structural diagram of the EAP-MD5 authentication system of the embodiment of the present invention;

[0030] As shown in the figure, the authentication system includes: AAA proxy device 203 and AAA server 204;

[0031] Wherein, the applicant 201 supports EAP-MD5 authentication; the authenticator 202 supports EAP-MD5 authentication; the AAA s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a network authentication method. AAA proxy device is introduced between authenticator and AAA server to acquire user name of applicator in EAP-MD5 style and randomly generate MD5 challenge word; user password is acquired in EAP-MD5 style; the acquired user name, challenged user password and randomly generated MD5 challenged word are submitted to AAA server for authentication in CHAP style; authentication result of CHAP style returned by AAA server is received and converted to EAP-MD5 style to notify applicator so that network supports new EAP-MD5 authentication withoutmodifying original network AAA server. The invention also discloses a network authentication system and AAA proxy device.

Description

technical field [0001] The invention relates to the technical field of authentication, in particular to a network authentication method, system and device. Background technique [0002] Currently, in an existing network requiring authentication, a Challenge Handshake Authentication Protocol (CHAP, Challenge Handshake Authentication Protocol) is usually used to authenticate network users. The basic process of CHAP authentication is: the authenticator in the network first sends a random challenge message to the user, and the user uses the one-way hash (HASH) function to calculate the response value based on the challenge message and the shared key information, and then sends it to The authentication server, the authentication server also performs the same calculation, and verifies whether its own calculation result is consistent with the received response value; if it is consistent, the authentication passes, otherwise the authentication fails. The advantage of this authentic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
Inventor 郑若滨
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products