Unlock instant, AI-driven research and patent intelligence for your innovation.

Extensible authentication protocol authentication access method and device

A technology for extending authentication protocol and access method, applied in the field of extensible authentication protocol authentication access method and device, can solve the problem of high dependence of terminal equipment, and achieve the effect of reducing dependence on external environment and improving system performance

Active Publication Date: 2017-12-26
ZTE CORP
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The present invention provides an extensible authentication protocol authentication access method and device to at least solve the problem in the related art that the EAP authentication causes the terminal equipment to be more dependent on the external environment

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Extensible authentication protocol authentication access method and device
  • Extensible authentication protocol authentication access method and device
  • Extensible authentication protocol authentication access method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present invention will be described in detail below with reference to the accompanying drawings and examples.

[0026] The invention provides an extensible authentication protocol authentication access method, figure 1 It is a flowchart of an extensible authentication protocol authentication access method according to an embodiment of the present invention, including the following steps S102 to S106.

[0027] Step S102, receiving a connection request from an APP of the terminal device, wherein the connection request is used for the APP to request access to its designated AP.

[0028] Step S104, generating an EAP authentication request message according to the parameters of the specified AP and the parameters of the USIM card of the terminal device.

[0029] Step S106, sending an EAP authentication requ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an extensible authentication protocol authentication access method and device. The method includes: receiving a connection request from an APP of a terminal device, wherein the connection request is used for the APP to request access to its designated AP; according to the designated AP The parameters of the parameters and the parameters of the USIM card of the terminal device generate an EAP authentication request message; and send the EAP authentication request message to the DRIVER of the terminal device. The invention reduces the dependence of the terminal on the external environment and improves the performance of the whole system.

Description

technical field [0001] The present invention relates to the communication field, in particular to an extensible authentication protocol authentication access method and device. Background technique [0002] The Extensible Authentication Protocol (EAP for short) is a user access network authentication protocol based on a Universal Subscriber Identity Module (Universe Subscriber Identity Module, USIM for short). This protocol can be directly applied to the data link layer, such as 802.11, 802.3, and Point to Point Protocol (PPP for short), providing a mechanism for retransmitting and eliminating duplicate messages. Under the EAP framework, all kinds of authentication can be supported. Different authentication access methods are implemented by extending the EAP request response message and introducing specific different authentication methods, mainly including EAP-SIM, EAP-authentication and key negotiation. protocol (Authentication and Key Agreement, referred to as AKA), etc....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04W12/08
CPCH04L63/08
Inventor 刘少华
Owner ZTE CORP