Authentication control method, device, system and authentication server

An authentication control and authentication request technology, applied in the communication field, can solve problems such as severe authentication storms, increase in the number of authentication messages, repeated user logins, etc., to reduce the scale of authentication storms, reduce the number of re-authentications, and improve the authentication experience Effect

Active Publication Date: 2010-05-12
RUIJIE NETWORKS CO LTD
View PDF0 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

At this time, because the Radius server and each authentication switch are operating at full capacity, it is often difficult to respond to user requests in a timely manner. Users often log in repeatedly due to authentication failures. In addition, each authentication switch itself has a retransmission mechanism, resulting in authentication packets. The number increases exponentially in a short period of time, which may lead to poor performance or even downtime of the Radius server
[0005] In order to solve the above problems, the prior art provides a retransmission and abandonment mechanism of protocol data packets, adopts a timing method, and through the timeout retransmission mechanism, when the authentication fails or the response time of the Radius server exceeds the preset timeout threshold, This protocol packet is discarded; however, this method does not reduce the pressure on the Radius server, but instead increases the number of accesses on the originally blocked channel, making the authentication storm situation worse
[0006] The existing technology also provides a concurrent response message processing mechanism, which usually adopts a multi-threaded concurrent processing mechanism to speed up the processing capability of the protocol message, so that the processing throughput per unit time is several times that of the traditional processing method. To a certain extent, the processing pressure brought by the authentication storm to the Radius server is alleviated, but this method has limited improvement in the processing capability of the Radius server. When encountering an authentication storm under large-scale applications, the Radius server still cannot solve the problem caused by the authentication storm. question

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication control method, device, system and authentication server
  • Authentication control method, device, system and authentication server
  • Authentication control method, device, system and authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0030] figure 1 It is a flowchart of an embodiment of the authentication control method of the present invention, such as figure 1 As shown, this embodiment may include:

[0031] Step 101, receiving an authentication request message from a first authentication client.

[0032] Step 102: Determine the waiting time of the first authenticatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an authentication control method, a device, a system and an authentication server. The authentication control method comprises the following steps: receiving an authentication request message of a first authentication client; determining the waiting time of the first authentication client according to current processing speed of the authentication requestmessage corresponding to a buffer zone and the total number of the current no-response authentication client corresponding to the buffer zone; sending the waiting time to the first authentication client so as to facilitate the first authentication client to send the authentication request after the waiting time is over. The embodiment of the invention realizes the reduction of authentication timeunder the condition of bursting authentication storm, effectively ensures the stable operation of the server and improves user authentication experience.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of communications, and in particular, to an authentication control method, device, system, and authentication server. Background technique [0002] Remote Authentication Dial In User Service (Remote Authentication Dial In User Service; hereinafter referred to as: Radius), is a network access server (Network Access Server; hereinafter referred to as: NAS) and shared authentication server transmission authentication, authorization and configuration information protocol. Radius uses a User Datagram Protocol (User Datagram Protocol; hereinafter referred to as: UDP) as a transmission protocol. In addition, Radius is also responsible for transmitting the accounting information between the NAS and the shared accounting server. [0003] In Radius, NAS is used to transmit user information to the designated Radius server, and then operate according to the returned information; the Radius se...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/56H04L47/30
Inventor 武卫杨鑫伟
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products