Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Connection establishment method and access authentication system for blocking-attacking resistant shared media terminal

A method for establishing a terminal connection, which is applied in the field of login methods and their implementation systems, can solve problems such as being no longer effective, and achieve the effects of small calculation amount and good calculation penalty effect.

Inactive Publication Date: 2010-10-20
NANJING UNIV
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

With the expansion of the scale of the local area network and the large-scale application of long-distance wireless networks, it is necessary to provide network services to users with different identities in an increasingly large broadcast network or network broadcast domain. The terminal authentication method based on cookie exchange is no longer valid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Connection establishment method and access authentication system for blocking-attacking resistant shared media terminal
  • Connection establishment method and access authentication system for blocking-attacking resistant shared media terminal
  • Connection establishment method and access authentication system for blocking-attacking resistant shared media terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0065] An embodiment system of the present invention such as figure 1 As shown, it includes a network access user terminal 11, a network access terminal 13, and a transmission link 12 between the network access user terminal 11 and the network access terminal 13, and the network access user terminal 11 includes a user terminal configuration memory inside 111, microprocessor module 112, data transceiving device 113 and random data memory 114, described network access terminal 13 comprises data transceiving device 131, microprocessor module 132, network interface transceiving module 133, configuration memory 134 and Login user database module 135 .

[0066] An improved embodiment system of the present invention such as Figure 24 As shown, it includes a network access user terminal 11A, a network access terminal 13A, and a transmission link 12 between the network access user terminal 11A and the network access terminal 13A, and the network access user terminal 11A includes a us...

no. 1 example

[0069] The connection login establishment process between the network access user terminal 11 and the network access terminal 13 includes as follows: figure 2 Steps S11-S16 are shown.

[0070] The first step (S11) of the terminal connection performed by the network access user terminal in order to log in to the network and use the network service is to listen to the scheduled broadcast of the network access terminal. The microprocessor module 132 in the network access terminal 13 takes out configuration parameters such as the broadcast time interval, the key perturbation strength 212 and the current system time from the configuration memory 134, and determines a period of time as the effective network access time window 213 according to the current network traffic volume, Then, the scheduled broadcast message is broadcast in plain text through the data transceiver 131 . The content of the regular broadcast message 21 includes current system time information 211 , key perturb...

no. 2 example

[0078] The improvement to the first embodiment of the connection login establishment process between the network user terminal 11 and the network access terminal 13 is as follows: figure 2 Steps S11-S16 are shown.

[0079] The first step (S11) of the terminal connection performed by the network access user terminal in order to log in to the network and use the network service is to listen to the scheduled broadcast of the network access terminal. The microprocessor module 132 in the network access terminal 13 periodically fetches configuration parameters such as the broadcast time interval, the key perturbation strength 212 and the current system time from the configuration memory 134, and determines a period of time according to the current network traffic volume as the effective network access time Window 213 generates a random number y according to the configuration of the network access terminal configuration memory 134 (such as the codeword length), and then further gene...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for identifying physical uniqueness of blocking-attacking resistant in-net terminal and a terminal access authentication system, which belongs to a method for a user terminal to access a communication service network and a system realizing the same. The invention is characterized in that the method divides the exchanging process of bi-direction messages for determining the legal identity of the user terminal into the following six steps: a network access terminal broadcasts the turbulence intensity of keys and an effective in-net time window; the in-net user terminal initiates an in-net request at an appointed time window; the network access terminal sends a terminal login token in a ciphertext mode; the in-net user terminal attempts to decode a response message; the in-let user terminal passes back terminal login token identifying information to the network access terminal; and the network access terminal verifies the terminal login token identifying information.

Description

technical field [0001] The invention belongs to a login method for a user terminal to access a communication service network and an implementation system thereof, in particular to a method for establishing a network access user terminal connection and an implementation system for initial authentication of terminal access for resisting blocking attacks. Background technique [0002] With the development of network technology and the popularization of network communication, network security has increasingly become the focus of people's attention. The current security threats to the network mainly come from hacker attacks, network defects, software loopholes, and lack of management. Blocking attacks initiated by network hackers or computer viruses are one of the more difficult to prevent. [0003] "Blocking attack" is also called "denial of service attack". It is a kind of network attack: when the communication network is attacked by this form, it partially or completely lose...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08H04L12/56H04L29/06
Inventor 陈相宁唐煌
Owner NANJING UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products