Unlock instant, AI-driven research and patent intelligence for your innovation.

Trusted network access method and system based on EAP

A network access and trusted technology, applied in the field of communication networks, can solve the problems of authentication security to be improved, and achieve the effects of improving compatibility, enhancing network security, and enhancing accuracy

Inactive Publication Date: 2017-06-23
BEIJING QIHOO TECH CO LTD +1
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As network security requirements are getting higher and higher, the existing identity authentication methods have been difficult to meet the requirements, and its authentication security needs to be improved

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trusted network access method and system based on EAP
  • Trusted network access method and system based on EAP
  • Trusted network access method and system based on EAP

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] An optional description of the present invention will be made below in conjunction with the accompanying drawings and specific embodiments.

[0045] TNC's network access layer is based on existing network access technologies, mainly including 802.1x, VPN and P2P. 802.1x provides port-based access control for LANs, and can control network connections through controlled ports and uncontrolled ports. This is currently the most widely used network access method. Therefore, this embodiment is implemented based on the IEEE802.1x standard protocol.

[0046] figure 1 Schematically shows a flow chart of an EAP-based trusted network access method according to an embodiment of the present invention, as shown in figure 1 As shown, it specifically includes the following steps:

[0047] Step 101, the NAC server performs preliminary identity authentication on the terminal, such as figure 2 shown;

[0048] Specifically, the following sub-steps are included:

[0049] Step 1011: T...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a trusted network access method and system based on EAP. The method comprises steps that initial identity authentication for a terminal is carried out by an NAC server; after initial identity authentication passes, secondary authentication for the terminal is carried out by the NAC server; after secondary authentication passes, trusted safety detection on the terminal is carried out by the NAC server. Through the method, through secondary identify authentication, accuracy of user identity authentication and network safety are improved; based on an IEEE802.1x standard protocol and an EAP protocol, network equipment compatibility is improved.

Description

technical field [0001] The invention relates to the technical field of communication networks, in particular to an EAP-based trusted network access method and system. Background technique [0002] With the rapid popularization of Internet applications, the relationship between people and the Internet has become increasingly close. However, due to the openness and interconnection of the Internet, there are many insecure factors in the network. The wanton attacks of malicious software and the destructive behavior of hackers have seriously threatened the security of people's interests. Therefore, a set of solutions that can not only protect computers from malicious attacks, but also provide security for accessing the network is very much needed now. The TNC (Trusted Network Connect, Trusted Network Connect) proposed by the Trusted Computing Group (TCG) was created under such a background. [0003] TNC can solve the terminal security problem in the network environment, and eva...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06
CPCH04L9/3215H04L9/3271H04L63/101
Inventor 朱禄
Owner BEIJING QIHOO TECH CO LTD