Network access authentication method and device

A network access and authentication method technology, applied in the field of network access authentication methods and devices, can solve problems such as affecting the online efficiency of terminal equipment and consuming a lot of human resources.

Active Publication Date: 2018-01-05
XINHUASAN INFORMATION TECH CO LTD
View PDF10 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above authentication process needs to collect the MAC address of each terminal device in advance. When an enterprise needs to use a large number of terminal devices to perform a large number of different role tasks, this process will consume a lot of human resources and will affect the online efficiency of terminal devices.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access authentication method and device
  • Network access authentication method and device
  • Network access authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] see figure 2 As shown, the network access authentication method provided by Embodiment 1 of the present application includes the following steps S201-S203:

[0031] S201: The authentication server receives an authentication request sent by a network device, and the authentication request carries an IP address and a MAC address of a terminal device to be authenticated.

[0032] S202: Determine the role task of the terminal device to be authenticated according to the IP address of the terminal device to be authenticated and the pre-stored mapping relationship between each IP address segment and the role task.

[0033] Wherein, the IP address of the terminal device to be authenticated is configured according to the pre-stored mapping relationship between each IP address segment and the role task, and the role task to be performed by the terminal device to be authenticated.

[0034] The embodiment of the present application is mainly applied to a scenario where an IP addres...

Embodiment 2

[0065] see Figure 4 As shown, the network access authentication device provided in Embodiment 2 of the present application includes:

[0066] The receiving module 401 is configured to receive an authentication request sent by a network device, and the authentication request carries an Internet protocol IP address and a media access control MAC address of the terminal device to be authenticated.

[0067] Executing module 402, configured to determine the role task of the terminal device to be authenticated according to the IP address of the terminal device to be authenticated and the pre-stored mapping relationship between each IP address segment and role task; For the IP address of the device, search for the MAC address corresponding to the IP address of the terminal device to be authenticated in the stored MAC addresses corresponding to each IP address; if not found, store the MAC address and IP address of the terminal device to be authenticated , to indicate that the termin...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network access authentication method and device. The method includes the steps that an authentication server receives an authentication request sent by a network device, the authentication request carries an internet protocol IP address and a media access control MAC address of a terminal device to be authenticated; according to the IP address of the terminal device to beauthenticated, as well as the mapping relationship between each prestored IP address segment and each role task, the role tasks of the terminal device to be authenticated are determined, and in the corresponding MAC address of each stored IP address, when the corresponding MAC address of the IP address of the terminal device to be authenticated is not found, the MAC address and the IP address of the terminal device to be authenticated are stored to represent the pass of an authentication of the device to be authenticated; the mapping relationship between the MAC address of the device to be authenticated and the role tasks of the terminal device to be authenticated is sent to the network device. By adoption of the network access authentication method and device, the online efficiency of theterminal device is improved when there are a large number of terminal devices.

Description

technical field [0001] The present application relates to the technical field of network authentication, in particular, to a network access authentication method and device. Background technique [0002] In the enterprise network, a large number of terminal devices such as Internet Protocol (IP) monitoring, access control, and printers are usually deployed. For the sake of enterprise security, these terminal devices are usually required to access the network only after being authenticated by the enterprise authentication server. Perform their respective roles and tasks. For example, some terminal devices are responsible for monitoring the examination room, some terminal devices are responsible for monitoring the campus playground, and some terminal devices are responsible for dormitory access control, etc. [0003] Generally, in order to implement the above authentication mechanism, the Media Access Control (MAC) addresses of each terminal device that needs to access the net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
Inventor 周扬
Owner XINHUASAN INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products