Authentication method, authentication device and authentication system

An authentication method and authentication system technology, applied in the field of authentication methods and device systems, can solve the problems of inconvenient implementation and insufficient security of the authentication mechanism, and achieve the effect of eliminating security problems

Active Publication Date: 2016-01-13
ZTE CORP
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an authentication method and device system, which can solve the security deficiencies of the authentication mechanism and the inconvenience of implementing it on the NAC system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, authentication device and authentication system
  • Authentication method, authentication device and authentication system
  • Authentication method, authentication device and authentication system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0061] The preferred embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings. It should be understood that the preferred embodiments described below are only used to illustrate and explain the present invention, and are not intended to limit the present invention.

[0062] figure 1 is a schematic diagram of the authentication method provided by the embodiment of the present invention, such as figure 1 As shown, the specific steps are as follows:

[0063] Step S1: the client receives the first authentication information from the authentication server and the third authentication information from the wireless access terminal, the third authentication information is obtained by the wireless access terminal according to the second authentication information sent by the authentication server.

[0064] In step S1, the first authentication information is the authentication information used by the client to authenticate the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses an authentication method, an authentication device and an authentication system, and relates to the field of communication. The authentication method comprises the steps that a client receives first authentication information from an authentication server and third authentication information from a wireless access end, wherein the third authentication information is acquired by the wireless access end according to second authentication information sent by the authentication server; and authentication is carried out on the authentication server according to the first authentication information, and authentication is carried out on the wireless access end according to the third authentication information. According to the invention, bidirectional authentication and key negotiation are carried out in an authentication phase on the basis of not changing an original EAPOL (Extensible Authentication Protocol over LAN) data frame format, and the client is provided to carry out identity authentication by using a key in an offline phase, thereby effectively preventing session hijacking and man-in-the-middle attacks, and relieving denial of service attacks.

Description

technical field [0001] The invention relates to the communication field, in particular to an authentication method and device system. Background technique [0002] The IEEE802LAN / WAN committee formulated the standard IEEEStd802.1X-2001 in 2001 to solve the problem of LAN network security, and then proposed its revised version in 2004: IEEEStd802.1X-2004. Research shows that at present, the 802.1X-based Network Access Control (NAC: Network Access Control) system is widely used in schools, enterprises and other units. However, IEEE802.1X has security flaws and faces security threats such as denial of service attacks (DoS: Denial of service attacks), session hijacking, replay attacks, and man-in-the-middle attacks. [0003] In order to eliminate protocol defects, there is currently a four-way handshake authentication solution. This solution is widely used in wireless networks and is a part of the IEEE802.11i standard. However, it still has certain security risks and faces seve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32H04W12/06H04W12/069H04W12/122
CPCH04L9/32
Inventor 刘鹏
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products