Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for realizing access authentication and client

A technology of access authentication and implementation method, which is applied in the field of communication, can solve problems such as low success rate of authentication process, and achieve the effect of improving flexibility

Active Publication Date: 2010-06-16
ZTE CORP
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Aiming at the low success rate of the authentication process in the related art because the authentication process can only be based on one authentication protocol, the present invention proposes an access authentication implementation method, which can select and try the protocol for server authentication for the user, so as to The certification process is optimized
[0006] Aiming at the problem in the related art that the authentication process can only be based on one authentication protocol, the success rate of the authentication process is low. optimize

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for realizing access authentication and client
  • Method for realizing access authentication and client
  • Method for realizing access authentication and client

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In related technologies, it usually only involves the interaction between the AAA client and server, and a single server switching mechanism, but only these mechanisms cannot support authentication switching between multiple protocols and methods, resulting in successful authentication. The access may fail due to other reasons, but it cannot try to access in other ways, resulting in a reduction in the success rate of the authentication process. The present invention considers that the access terminal (user) does not care about which authentication method is used for authentication. The authentication method The designation is done by the AAA client. Therefore, the present invention proposes that the AAA client can bind multiple authentication methods and method lists for the access type adopted by the user (access end), and ensure that the authentication method is selected through the protocol selection strategy. Within the minimum range allowed by security, the user's a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for realizing access authentication and a client. The method comprises that: the client determines a plurality of authentication protocols adopted for access authentication of a user; and the client performs access authentication of the user by using the plurality of authentication protocols. The method can enable a user to access by using the plurality of protocols, thereby effectively enhancing the flexibility of access authentication and improving the rate of successful accesses on the premise of ensuring the safety of access authentication.

Description

technical field [0001] The invention relates to the communication field, in particular to a method for implementing access authentication and a client. Background technique [0002] In the traditional Authentication Authorization and Accounting (AAA) authentication process, when the AAA client receives an access request from the access terminal (user), it needs to authenticate according to the access type. The protocol finds the servers corresponding to the authentication protocol, and then initiates authentication requests to these servers with the policy configured under the protocol. [0003] However, when the above authentication methods are used, each type of access can only select one AAA authentication protocol for authentication, that is, the authentication methods of access requests are strictly limited within the range specified by the authentication protocol. If the access type adopts the same authentication method, it must follow the same authentication strategy...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/04H04W12/06
Inventor 杨洋
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products