Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method, network switch and network system for authenticating terminals

A network switch and terminal technology, applied in the field of communication, can solve the problems of the terminal being unable to respond, the authentication process takes a long time, and the configuration and maintenance are complicated.

Active Publication Date: 2014-07-09
HUAWEI TECH CO LTD
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

For a terminal without 802.1x authentication software installed, when the network switch receives a message from the terminal, it first requests the user name from the terminal. Since the 802.1x authentication software is not installed, the terminal cannot respond.
The network switch automatically transfers to the MAC authentication process after waiting for a timeout. The MAC authentication process can automatically open the network access authority for the terminal without authentication. However, in this way, the terminal obtains the network access authority without authentication. Potential safety hazard; when MAC authentication is used as the authentication process, the user name and password are used as the authentication account for authentication, and each terminal corresponds to an authentication account. Therefore, every time a terminal is added, an authentication account needs to be added on the remote server. Leads to long certification process and complex configuration and maintenance

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, network switch and network system for authenticating terminals
  • Method, network switch and network system for authenticating terminals
  • Method, network switch and network system for authenticating terminals

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention more clear, the embodiments of the present invention will be further described in detail below in conjunction with the accompanying drawings. Here, the exemplary embodiments and descriptions of the present invention are used to explain the present invention, but not to limit the present invention.

[0027] Such as figure 1 As shown, in the embodiment of the present invention, when performing MAC bypass authentication, the processing flow of the method for authenticating the terminal may include:

[0028] Step 101, pre-map a segment of consecutive MAC addresses of multiple terminals to the same authentication account;

[0029] Step 102: An authentication request sent by any terminal is received, and the authentication request includes the source MAC address of the arbitrary terminal; during specific implementation, the authentication request may be, for example, ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method, network switch and network system for authenticating terminals. The method comprises the following steps: premapping continuous media access control (MAC) addresses of multiple terminals into the same authentication account number; receiving the authentication request sent by any terminal, wherein, the authentication request comprises a source MAC address of any terminal; if the source MAC address of any terminal is within the continuous MAC addresses, authenticating any terminal according to the premapped authentication account number. By utilizing the method provided by the invention, a large amount of operations for configuring one authentication account number when each terminal enters a network are avoided, thus lowering the labor and configuration expense, facilitating the deploying and maintaining of the network, and obviously lowering the cost.

Description

technical field [0001] The invention relates to the technical field of communication, in particular to a method for authenticating a terminal, a network switch and a network system. Background technique [0002] When a terminal such as a PC (Personal Computer, personal computer) or an IP phone (telephone) is connected to the network switch through the home gateway, the network switch enables an authentication function on the port. MAC (Media Access Control, Media Access Control) bypass authentication is a technology to solve the application scenario of mixed access of various types of terminals. The principle is: [0003] For terminals installed with 802.1x authentication software, obtain network access rights by initiating 802.1x authentication. For a terminal without 802.1x authentication software installed, when the network switch receives a message from the terminal, it first requests the user name from the terminal. Since the 802.1x authentication software is not inst...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L12/931
Inventor 张帅周广证
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products