Secure broadband access method, authentication method, device and system

A technology for secure access and access authentication, which is applied in the field of network security and can solve problems such as insecure broadband account information.

Active Publication Date: 2010-08-04
CHINA UNITED NETWORK COMM GRP CO LTD +1
View PDF0 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a broadband security access method, a broadband security access authentication method, a broadband security access device, a broadband

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure broadband access method, authentication method, device and system
  • Secure broadband access method, authentication method, device and system
  • Secure broadband access method, authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The technical solutions of the present invention will be described in further detail below with reference to the accompanying drawings and embodiments.

[0038] Aiming at the defects in the prior art, the present invention stores the user name and password identifying the user identity in the chip memory, and the user name and password form authentication information after being encrypted by the chip memory, and send it to the access authentication system through the client software to request Authentication. In addition, the user name and password stored in the chip memory can only be read by the dedicated client software, which is invisible to the user.

[0039] figure 1 It is a flow chart of Embodiment 1 of the broadband secure access method of the present invention. This embodiment describes the process of the broadband security access method of the present invention from the perspective of the client. Such as figure 1 As shown, this embodiment includes:

[004...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a secure broadband access method, a secure broadband access authentication method, a secure broadband access device, a secure broadband access authentication device and a secure broadband access system. The secure broadband access method comprises the following steps: performing private key signature process on user broadband account information read from a chip memory, wherein the user broadband account information comprises a user name and a password; coding the user broadband account information through the private key signature process and a user personal digital certificate read from the chip memory respectively; organizing the coded user broadband account information and the coded user personal digital certificate to form authentication information, and sending the authentication information to an access authentication system so that the access authentication system authenticates the authentication information; and under the condition that the authentication information passes the authentication of the access authentication system, receiving login success message sent by the access authentication system. The invention improves the security of the authentication information in the transmission process.

Description

technical field [0001] The invention relates to the technical field of network security, in particular to a broadband security access method, a broadband security access authentication method, a broadband security access device, a broadband security access authentication device and a broadband security access system. Background technique [0002] At present, user identity identification during the broadband access process is generally realized by the user uploading the user name and password to the access authentication system. Among the broadband access methods based on user name and password authentication, the most widely used is that the user manually enters the user name and password through the local client software, and then sends it to the access authentication system to request authentication to access the broadband. The above username and password are the broadband account information of the user. This method requires the user to install client software on a local...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/32
Inventor 王炳辉杨阳
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products