Supercharge Your Innovation With Domain-Expert AI Agents!

Wide area network endpoint access domination (EAD) authentication method, system and terminal

A terminal access and authentication method technology, which is applied in the field of WAN terminal access control authentication, can solve the problems of small WAN link bandwidth, occupying WAN bandwidth, instability, etc., and achieve the effect of saving WAN bandwidth and improving download speed

Inactive Publication Date: 2009-11-18
NEW H3C TECH CO LTD
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The file loading at this time will occupy the bandwidth of the WAN
[0025] 2. The terminal that needs to be repaired downloads the repair file across the WAN. Since the bandwidth of the WAN link is small (2M-10M) and unstable, it takes a long time to download a large file, which will cause the security authentication to fail over time.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Wide area network endpoint access domination (EAD) authentication method, system and terminal
  • Wide area network endpoint access domination (EAD) authentication method, system and terminal
  • Wide area network endpoint access domination (EAD) authentication method, system and terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] Figure 4 It is a flowchart of a wide area network EAD authentication method according to an embodiment of the present invention. This method is applied when the iMC security authentication server in the headquarters network performs EAD security checks on the terminals in the branch network, and the iMC security authentication server records the identifiers of each repair file and the corresponding username, such as Figure 4 As shown, the method includes:

[0053] Step 401, the iMC security authentication server receives the security check result reported by the terminal in the branch office network, and when it is determined that the security check result does not match the preset security policy, and the terminal needs to download a specified repair file, it sends a message to the terminal Sending a point-to-point P2P user information table; the P2P user information table includes the user name corresponding to the terminal that has downloaded the specified repair...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a wide area network endpoint access domination (EAD) authentication method, comprising: after that the specified restoration documents are needed to be downloaded by a terminal is determined by EAD security inspection, an iMC security certificate server sends P2P user information table to the terminal; the P2P user information table includes a user name corresponding to the terminal which downloads the specified restoration documents; then, the terminal inquiries a terminal IP address corresponding to the user name which belongs to a branch network in the P2P user information table through an EAD control gateway of the branch network and receives a local IP address table returned by the EAD control gateway; the terminal is connected with the corresponding terminal according to the local IP address table, downloads the specified restoration documents and carries out self- restoration for EAD authentication again. The invention also discloses a wide area network EAD authentication system and the terminal. The technical proposal can save bandwidth of the wide area network and accelerates the speed of download.

Description

technical field [0001] The invention relates to the technical field of network authentication, in particular to a wide area network terminal access control authentication method, system and terminal. Background technique [0002] Endpoint Access Domination (EAD) technology is a network access scheme used to detect whether a terminal accessing the network is safe, and it mainly solves the problems of "identity authentication" and "security check" when the terminal accesses the network. [0003] The EAD solution uses network devices as the EAD control gateway for terminal access, and uses the extended Portal protocol for EAD authentication and security checks. Wherein, the security check includes but is not limited to checking the status and version of the antivirus software of the terminal, checking the software running on the terminal, and checking whether the operating system patch of the terminal meets requirements. During the security inspection stage, the terminal that ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 刘浩
Owner NEW H3C TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More