Message transmission method and equipment
A transmission method and message technology, applied in the communication field
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0060] The present invention will be described in detail below in conjunction with specific application scenarios. In this application scenario, the Figure 5 The agent diagram shown is illustrated as an example.
[0061] Wherein, this application scenario includes: (1) the client, that is, the client authenticated by the authentication server, can enable proxy for other clients. (2) Other clients, that is, clients that have not been authenticated by the authentication server, hope to be able to access the network through the client. (3) The access device, that is, the network access device, can work at the network access layer, forward the access protocol information from the client to the authentication server, and grant the client corresponding network access rights according to the result of the authentication server , for example, the access device may be a device such as a switch, a router, or a firewall. (4) The authentication server is used to verify the identity in...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 