Authentication method, device and system

An authentication method and technology of an authentication device, which are applied in the fields of authentication methods, devices and systems, can solve the problems of user information leakage, increasing the workload of the authentication server, and increasing the risk of being attacked on the network.

Active Publication Date: 2016-03-30
MAIPU COMM TECH CO LTD
View PDF6 Cites 15 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the existing 802.1X authentication method, the illegal client can continuously send EAPoL packets to the authentication server through the access device, and determine whether there is a corresponding User name, and then from the EAPoL message sent from the authentication server to the illegal client to request the authentication certificate, the authentication method and authentication certificate corresponding to the user name are deduced, which leads to the leakage of user information and increases the risk of network attack. During this process, the illegal client will continuously send messages to the authentication server, which will also increase the workload of the authentication server and consume a lot of resources, resulting in a decrease in authentication efficiency.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and system
  • Authentication method, device and system
  • Authentication method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0024] like figure 1 As shown, authentication methods based on the 802.1X protocol generally include:

[0025] 101. The client sends an authentication start message to the access device to start the authentication process;

[0026] 102. After receiving the authentication start message, the access device responds to the authentication start message sent by the client and sends an authentication information request message to the client, requesting the client t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an authentication method, device and system, relates to the technical field of communication, and aims to screen authentication behaviors specific to a client on access equipment in order to prevent the client from accessing a network without authorization, reduce resources consumed by authentication and increase the authentication efficiency. The method comprises the following steps: receiving an authentication starting message which includes a client MAC (Media Access Control) address and is sent by the client; matching the MAC address of the client with a preset MAC address table including legal client MAC addresses; and when the MAC address of the client is not matched with the preset MAC address table, discarding the authentication starting message. The embodiment of the invention is used for performing authentication on the access equipment.

Description

technical field [0001] The embodiments of the present invention relate to the communication field, and in particular, to an authentication method, device and system. Background technique [0002] With the popularization of network applications, it is more and more important to improve network security. At present, in a process of accessing a network, a user usually accesses an access device connected to the network to access the network. Before the access device provides users with network access services, it is one of the methods to maintain the network security of the network they access, by checking the user's legality to control the user's network access behavior. [0003] In the prior art, the 802.1X protocol proposed by the IEEE (Institute of Electrical and Electronics Engineers, full name: Institute of Electrical and Electronics Engineers) standardization organization is usually used to check the validity of the connected user / device. The 802.1X protocol is an acces...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/0876
Inventor 吉帅
Owner MAIPU COMM TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products