Message authentication method and device

A message authentication and message technology, applied in the field of network communication, can solve the problems of slow user online rate, CPU impact, and impact on the authentication device's message authentication efficiency, etc., to improve the authentication efficiency and reduce the impact of the CPU.

Active Publication Date: 2015-04-29
NEW H3C TECH CO LTD
View PDF4 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, packet authentication takes a certain amount of time, and the traffic rate in the network is very high and there are many types of packets. This requires the CPU to continuously receive packets and trigger the authentication device to authenticate the received packets. It will cause an impact on the CPU, and it will also affect the authentication efficiency of subsequent authentication devices for packets, which will eventually lead to slow user login speed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Message authentication method and device
  • Message authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0019] The method provided by the invention can reduce the impact of the message on the CPU and improve the authentication efficiency of the message.

[0020] pass below figure 1 The method provided by the invention is described:

[0021] see figure 1 , figure 1 The flow chart of the method provided by the present invention. The method is applied to an access device, such as a Broadband Remote Access Server (BRAS: Broadband Remote Access Server). Such as figure 1 As shown, the method may include the following steps:

[0022] Step 101, receiving a message.

[0023] Step 102, judging whether there is an entry corresponding to the user information carried in the message in the established authenticated user table, if not, perform step 103, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a message authentication method and device. According to the message authentication method and device, when a table item which corresponds to user information carried in a received message, is judged to exist in established and authenticated user tables, the message is forwarded directly, it can be guaranteed that a CPU does not repeatedly receive the message transmitted by an authenticated user or repeatedly trigger the authentication device to conduct authentication to the message transmitted by the authenticated user, so that impact to the CPU is reduced, and authentication efficiency of messages is improved.

Description

technical field [0001] This application relates to network communication technology, in particular to a message authentication method and equipment. Background technique [0002] In network communication technology, a commonly used authentication method is traffic-triggered authentication, that is, when the access device receives a packet and finds that the authentication information of the packet is not recorded locally, it sends the packet to the local device The CPU triggers the authentication device to authenticate the message. If the authentication is passed, the message is forwarded and the authentication information of the message is recorded, so that the message of this type can be directly forwarded later. If the authentication fails, the message is discarded. . [0003] However, packet authentication takes a certain amount of time, and the traffic rate in the network is very high and there are many types of packets. This requires the CPU to continuously receive pa...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/801H04L29/06
Inventor 邵巍周英汪亮何伟
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products