Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Method and system based on EAP authentication

An authentication terminal and authentication information technology, applied in the field of information security, can solve problems such as low security and inconvenient unified management

Active Publication Date: 2009-12-02
FEITIAN TECHNOLOGIES
View PDF0 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] 1) Currently, the authentication method that supports EAP messages is not highly secure because it adopts static authentication;
[0012] 2) Since the authentication terminal in EAP authentication can be in various forms, such as personal computer, company server or dedicated server, etc., this brings a lot of inconvenience to unified management

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system based on EAP authentication
  • Method and system based on EAP authentication
  • Method and system based on EAP authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0094] see figure 1 , the embodiment of the present invention provides a method based on EAP authentication, which specifically includes the following steps:

[0095] Step 101: the client sends an authentication request EAP packet to the EAP authentication server.

[0096] Step 102: The EAP authentication server responds and requests authentication information of the client.

[0097] The EAP authentication server may also be other forms of network access control terminals, such as routers.

[0098] Step 103: The smart key device generates the authentication information of the current random password and sends it to the client.

[0099] The step of generating the current random password by the smart key device is specifically: the smart key device calculates the built-in generating elements according to the preset random password algorithm to generate the current random password. The generation element is a time generation element, an event generation element, or the like. ...

Embodiment 2

[0113] see figure 2 , the embodiment of the present invention provides a method based on EAP authentication, which specifically includes the following steps:

[0114] Step 201: the client sends an authentication request EAP packet to the EAP authentication server.

[0115] Step 202: The EAP authentication server responds and requests authentication information of the client.

[0116] The EAP authentication server may also be other forms of network access control terminals, such as routers.

[0117] Step 203: The smart key device generates the authentication information of the current random password and sends it to the client.

[0118] The step of generating the current random password by the smart key device is as follows: the smart key device calculates the built-in generating elements according to the preset random password algorithm to generate the current random password. The generation element is a time generation element, an event generation element, or the like. A...

Embodiment 3

[0136] see image 3 , the embodiment of the present invention provides a system based on EAP authentication, including a smart key device 300, a client 400, a network access control terminal 500 and a dedicated authentication terminal 600,

[0137] The smart key device 300 includes a generation module 301, an output module 302 and a control module 303:

[0138] The generation module 301 is used to generate the current random password according to the preset random password algorithm under the control of the control module 303, and send the current random password to the output module 302;

[0139] The output module 302 is used to send the authentication information including the current random password to the client 400 under the control of the control module 303;

[0140] The control module 303 is used to control the generating module 301 to generate the current random password, and control the output module 302 to output the authentication information including the current ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of information security, in particular to a method based on EAP authentication, comprising the following steps: a client transmits an authentication request EAP message to a network access control terminal; the network access control terminal responds to and requests the authentication information of the client; the client receives the authentication information containing a current random password generated by a smart key device, and the authentication information is transmitted to the network access control terminal in the mode of the EAP message; the network access control terminal transmits the authentication information containing the current random password to a special authentication terminal after receiving the authentication information; and the special authentication terminal authenticates the authentication information containing the current random password and transmits an authentication result to the network access control terminal, and the network access control terminal transmits the authentication result to the client in the mode of the EAP message. The invention also provides a system based on EAP authentication. Because the invention adopts a random password technique, the security is enhanced; and moreover, because the invention adopts the special authentication terminal, various control and management functions can be realized, thus being convenient for unified management.

Description

technical field [0001] The invention relates to the field of information security, in particular to a method and system based on EAP authentication. Background technique [0002] With the development of computer technology, people pay more and more attention to information security, among which identity authentication is an important part of information security. [0003] At present, there are more and more cybercrime cases, and the key to rectifying the reasons lies in the authentication method used. At present, the most commonly used method is the "static password" authentication method. The so-called "static password" authentication method means that the data used for authentication is static, that is, the password used for each authentication is unchanged, so "static password" authentication The authentication password of the method is easily intercepted by technologies such as memory scanning or network monitoring, and there are fundamental security risks. The most co...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L12/56H04L12/911
Inventor 陆舟于华章
Owner FEITIAN TECHNOLOGIES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products