Safe access method based on extended 802.1x authentication system

A technology of secure access and authentication system, applied in the access field of data communication, can solve the problem of inability to realize trusted access of end users, and achieve the effect of ensuring authenticity

Active Publication Date: 2010-06-30
MAIPU COMM TECH CO LTD
View PDF1 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The invention provides a secure access method based on the extended 802.1x authentication system, thereby overcoming the problem that the existing 802.1x authentication protocol cannot realize trusted access of end users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safe access method based on extended 802.1x authentication system
  • Safe access method based on extended 802.1x authentication system
  • Safe access method based on extended 802.1x authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0045] Combine now image 3 , the security access process of the present invention is described in detail: when the security terminal user and the two-layer access device have established a physical connection, the security terminal sends an EAPOL authentication start message to the two-layer access device according to the standard EAPOL protocol, and starts the 802.1 For xR authentication, the Layer 2 access device sends an EAP identity authentication request message to the security terminal, requiring the security terminal to submit a user name. The security terminal responds with an extended EAP identity authentication response message to the Layer 2 access device. The response message contains user name information and security access tag information. The Layer 2 access device records the response message with the security mark, and submits the user name to the RADIUS authentication service. The RADIUS authentication server generates a 128-bit challenge, and responds to t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a safe access method based on a extended 802.1x authentication system, wherein the method which is based on EAPOL standard protocol expands EAPOL protocol identity authentication response message of authentication requestor and adds secure access mark to ensure that the authentication point control enters the safe access procedure; and an authentication server and a strategy server adopt authentication point mutual security level information message to realize that the authentication requestor, namely the terminal user accesses the network through a two-level access device safely and reliably. The invention can better satisfy the access control of the two-level access device to the terminal by expanding standard EAPOL protocol; and the truth and credibility of edgedevice of access network can be fully guaranteed while the traditional access authentication mode is not changed.

Description

technical field [0001] The invention relates to the access technology of data communication, in particular to the technology of terminal equipment securely accessing through the two-layer access equipment by using the 802.1x protocol. Background technique [0002] With the deepening of network applications, network security problems are becoming more and more serious. Security problems including denial of service attacks, viruses, hacking, spyware, phishing, etc. are more and more likely to occur, and the harm they bring is also becoming more and more serious. , becoming a major threat to Internet security. Traditional networks defend against security attacks through layered security, such as providing increasingly higher levels of security protection for network perimeters, critical network segments, and application-oriented authorization; these models provide comprehensive network access, can protect resources, and prevent external Threats and illegal application access, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
Inventor 佘健何恐
Owner MAIPU COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products