Unlock instant, AI-driven research and patent intelligence for your innovation.

Authentication method, device, access equipment and controllable equipment of network equipment

A technology for accessing equipment and network equipment, applied in the field of communication, can solve problems such as low network security, and achieve the effect of improving network security

Active Publication Date: 2016-03-30
RUIJIE NETWORKS CO LTD
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the existing device identity authentication does not support the authentication of network device permissions, and the network security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device, access equipment and controllable equipment of network equipment
  • Authentication method, device, access equipment and controllable equipment of network equipment
  • Authentication method, device, access equipment and controllable equipment of network equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] figure 1 It is a flowchart of an embodiment of the authentication method of the network equipment of the present invention, such as figure 1 As shown, the authentication method of the network device may include:

[0047]Step 101, after the access device is connected to the controllable device, the controllable device sets the port connected to the access device in the controllable device as a controlled port, and the filtering rule of the controlled port is to exclude All packets other than those used for authentication are filtered and blocked.

[0048] Wherein, the above-mentioned controllable device is a device successfully authenticated and connected to the network.

[0049] Specifically, in this embodiment, after the controllable device finds that an access device is connected to the controllable device, it sets the port connected to the access device in the controllable device as a controlled port, and the filtering of the controlled port The rule is to filter ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network device authentication method, a device, an access device and a controllable device. The network device authentication method includes that after the access device is connected with the controllable device which is authenticated successfully and is connected to a network, a port, connected with the access device, of the controllable device is arranged to a controlled port by the controllable device, a filtering rule of the controlled port is that all messages except for messages used for authentication are filtered and blocked, an authentication request frame is sent to the access device through the controlled port, and then the controllable device receives an authentication response frame sent by the access device, abstracts certificate information, carried by the authentication response frame, of the access device, and packs the certificate information in the authentication messages to send to an authentication server, and authentication of the certificate information of the access device by the authentication server is facilitated. The network device authentication method, the device, the access device and the controllable device can achieve authentication of an authority of a network device based on the port and then achieve authentication of all devices accessed in the network, and improves safety of the network.

Description

technical field [0001] The invention relates to information security technology, in particular to an authentication method and device for network equipment, access equipment and controllable equipment, and belongs to the field of communication technology. Background technique [0002] Public key infrastructure (Public Key Infrastructure; hereinafter referred to as: PKI) is a key management platform that follows established standards and can provide cryptographic services such as encryption and digital signatures and the necessary key and certificate management systems for all network applications. In other words, PKI is the infrastructure for providing security services established using public key theory and technology. The core technology of PKI revolves around the entire life cycle of digital certificate application, issuance, use and revocation. [0003] The above-mentioned digital certificate is issued by the certificate authority (CertificateAuthority; hereinafter ref...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 杨敬民魏丽英
Owner RUIJIE NETWORKS CO LTD