Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Authentication method, authentication server and authentication system

A technology of authentication server and authentication method, applied in the field of network authentication, which can solve the problem of inability to authenticate users in subdomains

Active Publication Date: 2015-01-07
RUIJIE NETWORKS CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] An embodiment of the present invention provides an authentication method, an authentication server, and an authentication system to overcome the problem that subdomain users cannot be authenticated in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, authentication server and authentication system
  • Authentication method, authentication server and authentication system
  • Authentication method, authentication server and authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0039] figure 1 A flowchart of an authentication method provided by an embodiment of the present invention, such as figure 1 As shown, the method of this embodiment may include:

[0040] Step 101: the authentication server obtains the user name.

[0041] Specifically, the authentication server will obtain the user name and password to be a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an authentication method, an authentication server and an authentication system. The authentication server sends inquiry information with a user name to multiple Windows AD domain name servers in a network after obtaining the user name so that the Windows AD domain name servers can determine whether to store a user principal name UPN corresponding to the user name, if an inquiry response carrying the UPN and fed back by a target Windows AD domain server is received, a lightweight directory access protocol (LDAP) authentication request message is constructed according to the UPN and sent to the target Windows AD domain server, and authentication result information sent by the target Windows AD domain server is received. The authentication server constructs the LDAP authentication request message according to the UPN corresponding to the user name and sent by the Windows AD domain server, subdomain user authentication can be successfully carried out, and accordingly a computer corresponding to the user can normally have access to network communication.

Description

technical field [0001] The invention relates to network authentication technology, in particular to an authentication method, an authentication server and an authentication system. Background technique [0002] With the rapid development of LAN technology, the network security problems of large and medium-sized enterprises have become increasingly prominent. One of the network security threats faced by enterprises is illegal access from inside. Therefore, it is imperative to establish an internal network access defense system. Now Enterprises generally use the combination of 802.1X protocol and Windows Active Directory (Windows Active Directory, referred to as: Windows AD) domain technology to realize the legal verification and management of device access, and only computers that have passed the Windows AD domain authentication In order to carry out normal network communication. [0003] In the prior art, when there are multiple Windows AD domains, the Windows AD domain aut...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 李健强
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products