Unlock instant, AI-driven research and patent intelligence for your innovation.

Network access control method and system

A network access control and access controller technology, which is applied in the transmission system, electrical components, etc., can solve the problem that the authentication server cannot be directly used for authentication services, the access controller cannot be directly connected with the authentication server, and the actual application needs of visitors cannot be met. question

Active Publication Date: 2012-08-08
CHINA IWNCOMM
View PDF4 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In an access control scenario that requires a third party, such as an authentication server, to participate in identity authentication, the access controller may not be able to directly connect to the authentication server due to the access controller itself or the destination network, resulting in the inability to directly use the authentication provided by the authentication server. Serve
In this case, the existing access control method, which is directly connected to the access controller and uses the authentication server to provide authentication services, cannot meet the actual application requirements of access control for visitors.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access control method and system
  • Network access control method and system
  • Network access control method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] See figure 2 The present invention provides a network access control system 100. The access control system 100 includes a visitor REQ, an authentication server AS, and an access controller AC. Before the system 100 works, authentication information used to verify mutual identities has been shared between the visitor REQ and the authentication server AS, and between the access controller AC and the authentication server AS.

[0056] See figure 1 , Figure 3 to Figure 7 The network access control system 100 completes the authentication and authorization of the visitor's REQ through six steps S1 to S6.

[0057] Step S1: See image 3 , The visitor REQ sends an access request message M1 to the access controller AC of the destination network. Access request message M1 contains Q REQ . Among them, Q REQ Indicates the visit request of the visitor REQ, the same below.

[0058] Step S2: See Figure 4 After receiving the access request message M1, the access controller AC of the de...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a network access control method and a system, and the method comprises the following steps: 1) an accessor REQ sends a access request message M1 to an access controller (AC); 2) the access controller (AC) constructs an access authentication request message M2 and then sends the M2 to the accessor REQ; 3) the accessor REQ constructs an identity authentication request message M3 and then sends the M3 to an authentication server (AS); 4) the authentication server (AS) constructs an identity authentication response message M4 and then sends the M4 to the accessor REQ; 5) the accessor REQ receives the M4 and then constructs an access authentication response message M5 and then sends the M5 to the access controller (AC); and 6) the access controller (AC) constructs an access response message M6 and then sends the M6 to the accessor REQ. The invention provides the access control method and the system capable of meeting the application requirement of carrying out access control on the accessor.

Description

Technical field [0001] The invention belongs to the network security application field in information security technology, and particularly relates to a network access control method and system. Background technique [0002] In the existing network access control method, usually after the visitor initiates an access request to the destination network, the access controller in the destination network completes the identification and authorization of the visitor, thereby realizing the access control of the visitor. In an access control scenario that requires a third party, such as an authentication server, to participate in identity authentication, the access controller may not be able to directly connect with the authentication server due to the access controller itself or the destination network, and the authentication provided by the authentication server cannot be used directly. service. In this situation, the existing access control method in which the access controller direc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 杜志强铁满霞黄振海曹军
Owner CHINA IWNCOMM