Method, system and device of security certificate

A technology for security authentication and authentication request, applied in the field of security authentication, which can solve problems such as poor user experience and complex maintenance

Active Publication Date: 2010-02-17
NEW H3C TECH CO LTD
View PDF0 Cites 45 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, this method requires operators to build and maintain two sets of security systems, such as image 3 As shown, th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system and device of security certificate
  • Method, system and device of security certificate
  • Method, system and device of security certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0042] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0043] The main method provided by the present invention can be as Figure 4 As shown, it mainly includes the following steps:

[0044] Step 401: After the AC activates the air interface authentication for the STA, the AC encapsulates the air interface authentication request in a remote user dial authentication system (Radius) protocol message and sends it to the BRAS.

[0045] Step 402: The BRAS sends the Radius protocol message encapsulated with the air interface authentication request to the air interface authentication server, and sends the Radius protocol message encapsulated with the authentication result returned by the air interface authentication server to the AC.

[0046] Step 403: When the AC determines that the authentication result i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method, a system and a device of security certificate. The method comprises the followings steps: encapsulating an empty certificate request in a protocol message of a remoteuser dial certification system (Radius) after an access controller (AC) activates the empty certificate of mobile termination (STA), sending the empty certificate request to an empty certificate server by a broad band access server (BRAS), and receiving the Radius protocol message in which a certificate result is encapsulated, returned by the empty certificate server through the BRAS; when the certificate result succeeds, authorizing the STA to be accessed to a wireless network, and permitting the STA to be accessed to a metropolitan area network after the BRAS determines the certificate result to be successful. The BRAS is fused in the empty certificate process, and the empty security certificate and the security certificate of accessing to the metropolitan area network are realized whileadopting the one-time empty certificate process. The invention has simple realization and brings user better user experience.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a method, system and device for security authentication. Background technique [0002] WLAN Authentication and Privacy Infrastructure (WAPI, WLAN Authentication and Privacy Infrastructure) is a protocol for implementing WLAN security. WAPI adopts the elliptic curve cryptographic algorithm of the public key key system and the block cipher algorithm of the symmetric cryptosystem, and is used for the encryption and decryption of digital certificates, certificate authentication, key negotiation and transmission data of wireless local area network (WLAN, Wireless Local Area Network) devices , so as to realize device identity authentication, link verification, access control and encryption protection of user information in wireless transmission state. [0003] When a mobile terminal (STA) logs in to a wireless access point (AP), it must pass the authentication server (AS) to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L12/56H04W12/06H04L47/2466H04W12/0431H04W12/069
Inventor 郑涛史扬常向青王飓刘建锋
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products