A two-way network access authentication method based on digital certificate

A technology of digital certificates and authentication methods, which is applied to user identity/authority verification and key distribution, can solve problems such as inability to authenticate server identity authentication, and network access authentication cannot realize non-host network access authentication, so as to increase implementation costs, improve security and Practicality, the effect of improving the efficiency of management

Active Publication Date: 2016-01-13
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF5 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] Aiming at the technical problem that network access authentication cannot realize non-host network access authentication in the prior art, a method capable of realizing network access authentication of network equipment and security protection equipment is disclosed
At the same time, the invention also discloses a method for authenticating the authentication server, which solves the technical problem that the authentication server cannot be authenticated in the prior art
The invention also discloses a method for simultaneously realizing management key negotiation in the process of network access authentication, which solves the management problem in the later stage of network access authentication in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A two-way network access authentication method based on digital certificate
  • A two-way network access authentication method based on digital certificate

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] The specific implementation manners of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0027] Such as figure 1 As shown in the divided area diagram of network access authentication, the two-way network access authentication method based on digital certificates disclosed in the present invention divides the network access authentication system into an area to be accessed and a trusted area, and the area to be accessed includes at least one customer to be authenticated The trusted zone includes an authentication server and at least one trusted client that has passed the authentication.

[0028] Such as figure 2 The flow chart of the two-way network access authentication method based on digital certificates is shown. The invention discloses a two-way network access authentication method based on a digital certificate, which specifically includes the following steps:

[0029] Step 1, divide the network access auth...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of network security. The invention discloses a two-way network access authentication method based on a digital certificate, which specifically includes the following steps: Step 1: Divide the network access authentication system into an access area and a trusted area, and classify the client to be authenticated. The terminal accesses the physical port of the trusted client; Step 2. After receiving the access information of the client to be authenticated, the authentication server actively initiates network access authentication to the client to be authenticated; Step 3. After the client to be authenticated receives the network access authentication, Submit the device authentication information to the authentication server, the authentication server starts authentication after receiving the authentication information, and feeds back the authentication result to the client to be authenticated. By physically connecting the client to be authenticated and the trusted client, the authentication server actively initiates network access authentication to the client to be authenticated after receiving the access information, so as to realize network access identity authentication of routing devices, switching devices, security protection devices, etc. , which improves the security and practicability of the network.

Description

technical field [0001] The invention relates to the technical field of network security, and discloses a two-way network access authentication method based on digital certificates. Background technique [0002] Network access authentication technology plays a vital role in ensuring the security and trustworthiness of network entities and the stability and reliability of network structures. Therefore, at present, the industry has carried out many fruitful researches and practices on network access authentication technology, and proposed many effective network access authentication technical means. However, the existing network access authentication technologies mainly target network access entities as hosts, and the verification process is mainly implemented by using or based on the 802.1x protocol. These technologies are limited to host access, and cannot meet some occasions with high security protection requirements, as well as the network access authentication requirement...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L9/32H04L9/08
Inventor 黎锐董贵山魏勇何智王金涛林俊燕
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products