Unlock instant, AI-driven research and patent intelligence for your innovation.

User identification method, device and system

A technology of user identity and determination method, applied in the field of communication, can solve the problem of illegal users not performing user authentication and so on

Inactive Publication Date: 2010-07-07
CHINA MOBILE COMM GRP CO LTD
View PDF0 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since both the IP address and the MAC address information can be tampered with, this method can easily lead to illegal users not performing user authentication, but using WLAN services for free by impersonating legal user identities.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User identification method, device and system
  • User identification method, device and system
  • User identification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] An embodiment of the present invention provides a user identity determination method, such as figure 1 shown, including:

[0030] Step S101: After the user is authenticated, the network first randomly generates the first information, encrypts the first information with the shared key corresponding to the address of the client where the authenticated user is located, and sends the encrypted result to the client where the authenticated user is located terminal, and record the current time as the legal time corresponding to the authenticated user.

[0031] Among them, the shared key is generated according to the user password, for example, use the key generation algorithm to operate the user password to generate the shared key; or generate a random number, and use the key generation algorithm to perform operations on the user password and the random number to generate Shared key; or use the key generation algorithm agreed with the client to operate on the user password to...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a user identification method, a device and a system. After the user authentication is passed, an identity legitimating moment corresponding to an authenticated user is recorded; a client side of the authenticated user periodically sends message in a set format to a network side; when the network side receives the message in the set format sent by the client side and confirms that information decrypted by a sharing secret key corresponding to the client side from the message in the set format is second information which meets a set conversion strategy with first information generated at random before, a current moment updates the identity legitimating moment corresponding to the user of the client side; when a detection period of the network side reaches, the corresponding user of the client side with the interval time length between the identity legitimating moment and the current moment being larger than a set threshold value is defined to be illegal. The method, the device and the system provided in the invention limit the illegal user to illegally have access to a network through address spoofing, thereby improving the accuracy for the user authentication.

Description

technical field [0001] The present invention relates to the communication field, in particular to a user identity determination method, device and system Background technique [0002] In the current Web authentication mechanism of the wireless local area network WLAN, user authentication is jointly completed by the access controller AC, the portal server, and the RADIUS (Remote Authentication Dial In User Service) authentication server. During user authentication, after the user's client establishes a connection with the access point AP, the DHCP address allocation is completed with the AC, that is, the AC assigns an address to the user's client, and the AC notifies the Portal server to send an authentication page to the user's client , the user sends the user name and user password to the Portal server through the client where the user is located, and then the AC, the Portal server and the RADIUS authentication server jointly complete the authentication of the user. After t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04W12/06H04L9/32H04W12/03
Inventor 刘利军李祥军邵春菊魏冰
Owner CHINA MOBILE COMM GRP CO LTD