802.1x-based authentication method and device

An authentication method and authentication method technology, applied in the field of network communication, can solve problems such as the need to improve authentication security, and achieve the effect of improving accuracy

Active Publication Date: 2015-08-26
NEW H3C TECH CO LTD
View PDF4 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As network security requirements are getting higher and higher, the existing 802.1x authentication methods have been difficult to meet the requirements, and its authentication security needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • 802.1x-based authentication method and device
  • 802.1x-based authentication method and device
  • 802.1x-based authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0031] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The application provides a 802.1x-based authentication method and device. The method comprises the steps that a current authentication user is preliminarily authenticated by adopting a 802.1x authentication mode according to the registered user identity information; after passing of preliminary authentication of the current authentication user is confirmed, auxiliary authentication information bound with the registered user identity information is acquired; and secondary authentication is performed on the current authentication user via the auxiliary authentication information by adopting a verification code authentication mode so that identity of the current authentication user is confirmed to be legal. Authentication accuracy and network security are enhanced on the basis of the existing 802.1x authentication mode with combination of verification code authentication.

Description

technical field [0001] The present application relates to the technical field of network communication, in particular to an authentication method and device based on 802.1x. Background technique [0002] The 802.1x protocol is a port-based network access control protocol, which authenticates and controls the connected terminal equipment at the port level of the LAN access gateway. If the terminal device connected to the port passes the authentication, it can access the LAN through the port. [0003] The 802.1x authentication system generally includes a terminal device used by a user, an access gateway, and an authentication server, and the system uses EAP (Extensible Authentication Protocol, Extensible Authentication Protocol) to implement authentication information exchange among the above-mentioned devices. As network security requirements are getting higher and higher, the existing 802.1x authentication methods have been difficult to meet the requirements, and its authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04W12/06
CPCH04L63/083H04L63/0876H04W12/06
Inventor 许文雨漆昱
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products