Network authentication system on basis of switchboards and authentication method for network authentication system

A network authentication and switch technology, applied in transmission systems, electrical components, etc., can solve problems such as security risks, false address spoofing, and network attacks in the intranet

Active Publication Date: 2013-12-04
SOUTH CHINA UNIV OF TECH
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Traditional web authentication often implements quasi-exit control of network traffic on the egress gateway device, which poses a security risk in the intranet; while the existing web authentication scheme based on network access devices, although network traffic access control is implemented on the network access device The access control improves the security of the intranet to a certain extent, but because there is no legality check of the source MAC address and source IP address for all user data packets that pass the Web authentication, false address spoofing may occur and related network attacks, and such network deception and attacks are difficult to track, making it increasingly difficult for network managers to effectively manage the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network authentication system on basis of switchboards and authentication method for network authentication system
  • Network authentication system on basis of switchboards and authentication method for network authentication system
  • Network authentication system on basis of switchboards and authentication method for network authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0039] Such as figure 1 As shown, a switch-based network authentication system includes multiple security access control switches, security management servers, address allocation servers, WEB access authentication servers, and multiple user clients. The security management server communicates with the address allocation server through the Internet. , the Web access authentication server and the security access control switch are interconnected, the address allocation server and the Web access authentication server are also interconnected with the security access control switch through the Internet, and the security access control switch is also connected to the user terminal through the access network.

[0040] Such as figure 2 As shown, the secure access control switch includes an access control agent module, an address learning module, a tuple relationship maintenance module, a Web authentication module, an access control log module and a filtering module, and the access co...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a network authentication system on the basis of switchboards. The network authentication system comprises the security access control switchboards, a security management server, an address allocation server, a Web access authentication server and user terminals. The invention further discloses an authentication method applied to the network authentication system on the basis of the switchboards. The authentication method includes steps that 1, the security management server configures security strategies; 2, the user terminals access a network, and the security access control switchboards learn relevant information of the user terminals; 3, the security access control switchboards determine whether the user terminals need Web authentication to surf the network or not according to the relevant information of the user terminals and the security strategies; 4, the Web authentication server authenticates users if the user terminals need the Web authentication; 5, the security access control switchboards allow the user terminals to surf the network if the users are successfully authenticated. The network authentication system and the authentication method have the advantages that the Web authentication bound with multiple elements can be performed on the network access users, so that the network authentication security is improved, the network reliability is enhanced, and the like.

Description

technical field [0001] The invention relates to a network access authentication technology, in particular to an exchange-based network authentication system and an authentication method thereof. Background technique [0002] With the rapid increase in the number of network users, network management and security issues are becoming more and more severe. Considering the characteristics of the campus network, which has many and scattered users and users have different network requirements, it is becoming more and more difficult for the traditional access authentication system to adapt to the increasing network scale and The requirements of diverse user needs make the disadvantages of traditional authentication increasingly prominent. [0003] Web authentication is a method widely used at present. It relies on a Web browser to perform interactive authentication with a Web authentication server through HTTP and HTTPS protocols. Compared with traditional access authentication met...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/12
Inventor 胡金龙张凌许勇周杰唐文军叶昭王昊翔陈启愉高亚军吴灿荣覃攸陈虹钊
Owner SOUTH CHINA UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products