Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method and communication device

A technology of communication equipment and authentication method, applied in the field of authentication method and communication equipment, can solve the problems of reducing the reliability of authentication and failing to perform authentication, and achieve the effect of improving reliability

Inactive Publication Date: 2013-01-30
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, when the challenge word length requirements of the authenticator and the authenticated are inconsistent, CHAP-based authentication will fail, thereby reducing the reliability of CHAP-based authentication.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and communication device
  • Authentication method and communication device
  • Authentication method and communication device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] In order to make the purpose, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are the Claim some of the examples, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0056] In addition, the term "and / or" in this article is only an association relationship describing associated objects, which means that there may be three relationships, for example, A and / or B, which may mean: A exists alone, A and B exist at the same time, There are three cases of B alone. In addition, the character " / " in this article generally indicates that the contextual obj...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication method and a communication device. A first communication device negotiates with a second communication device by an LCP (Link Control Protocol) so as to obtain a challenge word length, and further generate a challenge word of which the length is same as the challenge word length, and thus, the first communication device can use the challenge word to carry out CHAP (Challenge Handshake Authentication Protocol)-based authentication on the second communication device. The method and the communication device can avoid the problem of failure in the CHAP-based authentication caused by inconformity of the requirements of an authenticator and an authenticated party on the challenge word length, thereby improving the reliability of the CHAP-based authentication.

Description

technical field [0001] The application relates to communication technology, in particular to an authentication method and communication equipment. Background technique [0002] Point to Point Protocol (Point to Point Protocol, PPP) provides two optional authentication methods, that is, authentication based on Password Authentication Protocol (Password Authentication Protocol, PAP) and authentication based on Challenge Handshake Authentication Protocol (Challenge Handshake Authentication Protocol, CHAP). ) certification. The two parties can use a Link Control Protocol (Link Control Protocol, LCP) to negotiate to determine which identity authentication method to use. When it is determined to adopt the CHAP-based authentication method, the authenticator selects a challenge word length such as 16 bytes or 32 bytes, and then the authenticator can use the challenge word whose length is the selected challenge word length to communicate with the authenticated The authenticator per...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 姜伟
Owner HUAWEI TECH CO LTD