Identity authentication method, system and equipment in EAP (Extensible Authentication Protocol) authentication
A technology of identification authentication and identification, which is applied in the field of communication, can solve the problems of inability to act and prevent forgery ID attacks, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.
[0049] Embodiments of the present invention provide an identification authentication method in EAP authentication, such as figure 1 shown, including:
[0050] Step s101, receiving the EAP message sent by the client, and obtaining the authentication identifier, random number, public key and signature information of the client carried in the EAP message;
[0051] Step s102: Authenticate the authentication identifier and signature information of th...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 