Authentication system and authentication method for network security access
An access authentication and secure access technology, which is applied in the field of authentication system for network security access, can solve the problems of DSCP value legality check, DSCP value spoofing, DSCP value irregularity, etc., and achieve easy IPQoS guarantee and simple internal state Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment
[0049] Such as figure 1 As shown, it is a schematic diagram of a typical system structure of the switch-based network authentication system, including multiple security access control switches, Web access authentication servers and user terminals, wherein the Web access authentication server and security access control switches pass The network is interconnected, and the security access control switch is connected to the user terminal through the access network.
[0050] Such as figure 2 As shown, a typical implementation of a secure access control switch includes a user terminal information learning unit, a tuple group information maintenance unit, a Web authentication unit, a control proxy unit, and a message filtering unit, and the control proxy unit and the user terminal information learning unit, a tuple group The information maintenance unit is connected with the Web authentication unit, and the multi-group information maintenance unit is also connected with the user t...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


