Unlock instant, AI-driven research and patent intelligence for your innovation.

Identity authentication method, system and equipment in EAP (Extensible Authentication Protocol) authentication

A technology of identification authentication and identification, which is applied in the field of communication, can solve the problems of inability to act and prevent forgery ID attacks, etc.

Active Publication Date: 2013-10-23
CHINA MOBILE COMM GRP CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The problem with this method is that it cannot be used as a general solution, because many current scenarios and authentication methods require the AAA server to know the client's authentication ID
However, the problem with this method is that although there is no user identification information in the NAI, attackers can still easily forge the NAI information for ID spoofing, so this method only protects the user ID from being leaked in plaintext transmission, and cannot prevent Forged ID Attacks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, system and equipment in EAP (Extensible Authentication Protocol) authentication
  • Identity authentication method, system and equipment in EAP (Extensible Authentication Protocol) authentication
  • Identity authentication method, system and equipment in EAP (Extensible Authentication Protocol) authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0048] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, not all of them. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0049] Embodiments of the present invention provide an identification authentication method in EAP authentication, such as figure 1 shown, including:

[0050] Step s101, receiving the EAP message sent by the client, and obtaining the authentication identifier, random number, public key and signature information of the client carried in the EAP message;

[0051] Step s102: Authenticate the authentication identifier and signature information of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiments of the present invention disclose a method, system and device for an identity authentication in the Extensible Authentication Protocol (EAP) authentication. The method includes: receiving an EAP message sent from a client, and obtaining the authentication identity, the random number, the public key and the signature information of the client which are carried in the EAP message; performing authentications for the authentication identity and the signature information of the client according to an authentication identity generation algorithm, the random number and the public key. By using the embodiments of the present invention, the stealing of the authentication identity can be prevented by utilizing the binding technique between the public key and the EAP authentication identity (ID), which thoroughly avoids that attackers filch or steal the authentication identities of other users.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an identification authentication method, system and equipment in EAP authentication. Background technique [0002] EAP (Extensible Authentication Protocol, Extensible Authentication Protocol) is an extensible framework for providing network access authentication, and can support different authentication methods. EAP is generally carried on the second layer of the Internet protocol. Users can only conduct legal network communication after completing the authentication stipulated by EAP. Users who cannot be authenticated correctly cannot perform data communication. Many networks use EAP as a standard protocol for access authentication, such as 802.11, WIMAX (Worldwide Interoperability for Microwave Access, Worldwide Interoperability for Microwave Access) and so on. EAP is the basis of Internet security authentication, which includes three entities: a client, an auth...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/32H04L9/30H04L29/06
CPCH04L63/08H04L63/164
Inventor 曹振刘大鹏邓辉
Owner CHINA MOBILE COMM GRP CO LTD