System and method for authenticating terminal trusted access

An access authentication and trusted technology, which is applied in the field of network security management, can solve problems such as network system paralysis and end user non-compliance, and achieve the effects of reducing network construction costs, facilitating operation, and solving identity uncertainties

Active Publication Date: 2015-08-26
CHANGAN UNIV
View PDF3 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, due to the complexity of the network environment, the diversity of network equipment, the diversity of network terminal access technologies, and the non-compliance of end users, the security issues of network border access, which are randomly accessed by terminals, have become increasingly prominent.
The network terminal is the entrance to access and access the network, and a single terminal bad point is enough to cause the paralysis of the entire network system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • System and method for authenticating terminal trusted access
  • System and method for authenticating terminal trusted access

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] Below in conjunction with accompanying drawing and embodiment the present invention is described in further detail:

[0026] The terminal trusted access authentication system of the present invention includes a user identity authentication module and a terminal access authentication module; the user identity authentication module completes the trusted identity authentication of the terminal user; the user identity authentication module includes a CA user certificate and a CA authentication server; the CA authentication The center distributes a USB-Key hardware device for each user, and the CA user certificate, private key and basic user information are stored in the USB-Key hardware device; the USB-Key hardware device can set user passwords and has a USB interface. The trusted access module of the terminal node completes the trusted access authentication of the terminal user; the trusted access module of the terminal node includes an access authentication switch, a CA au...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a system and a method for authenticating terminal trusted access. According to the invention, a public key and identification information of a user are bound and stored in an electronic certificate through a CA, and identity authentication of the user is realized; and the confidentiality, the integrity and the non-repudiation of user information are ensured by being combined with data encryption and digital signature technologies. The system disclosed by the invention is low in requirement for the overall performance of equipment, can effectively reduce the networking cost, supports multicast services, is compatible with a PPP (point-to-point protocol), good in expansibility and adaptability, designed with a controllable port and an uncontrollable port, and realizes separation of services and authentication. The system does not need to carry out packaging processing on a data packet after passing authentication, is high in efficiency, can map different user levels to different VLANs (virtual local area networks), realizes management for user domains with different authorities, and has the advantages of simple implementation mode, high authentication efficiency, safety, reliability and easy operation.

Description

technical field [0001] The invention belongs to the technical field of network security management, relates to a security management and control system, and in particular to a terminal trusted access authentication system and method. Background technique [0002] At present, due to the complexity of the network environment, the diversity of network devices, the diversity of network terminal access technologies, and the non-compliance of end users, the security issues of network border access, which are randomly accessed by terminals, have become increasingly prominent. The network terminal is the entrance to access and access the network, and a single terminal failure is enough to cause the paralysis of the entire network system. The terminal trusted access system is the first and most important line of defense to ensure network security. How to effectively control the secure access of network terminals, build a terminal trusted access authentication control system, and pre...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823
Inventor 屈立成李坤伦李鹏曹伟孙大跃高小梅张超崔华茹
Owner CHANGAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products