Unlock instant, AI-driven research and patent intelligence for your innovation.

An authentication proxy method, device and equipment

A technology of authentication equipment and proxy equipment, which is applied in the field of authentication, can solve problems such as long authentication delay, achieve the effects of shortening the authentication time, improving authentication efficiency, and improving user experience

Active Publication Date: 2022-03-22
ZTE CORP
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The present invention provides an authentication proxy method, device and equipment to solve the problem of long authentication time delay when remote authentication is performed in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An authentication proxy method, device and equipment
  • An authentication proxy method, device and equipment
  • An authentication proxy method, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0031] This embodiment provides an authentication proxy method, such as figure 1 Shown is a flow chart of the authentication proxy method according to the first embodiment of the present invention. The execution subject of this embodiment is a proxy device.

[0032] Step S110, intercepting the redirection message sent by the first authentication device to the user terminal.

[0033] The redirection message is a response message to the IP access request after the first authentication device determines that the user terminal has not passed the authentication according to the IP access request of the user terminal. The redirection message is used to redirect the IP access request to the second authentication device, so that the second authentication device initiates an authentication request for the user terminal.

[0034] The first authentication device mainly provides services such as domain name resolution and broadband access, and the first authentication device may be a br...

Embodiment 2

[0054] In the satellite communication system, the satellite end station is used as the ground station of the communication satellite, and is used for transparently transmitting authentication interaction messages between the user terminal and the Bras server and the Portal server. The user terminal accesses the network via the satellite terminal station, and the Bras server intercepts the user terminal's Internet access request and judges whether the user terminal has passed the AAA authentication. The terminal obtains the authentication page from the Portal server, and the user terminal sends authentication information to the Portal server based on the authentication page. The Portal server, the Bras server, and the AAA authentication server cooperate to complete the AAA authentication of the user terminal, and the Portal server returns the authentication result to the user terminal. .

[0055] During this process, Internet access requests, redirection messages, authenticatio...

Embodiment 3

[0082] In order to make the present invention more clear, based on the following image 3 The present invention is further described. Since the ground station (the second ground station) and the communication satellite far away from the user terminal only play the role of forwarding information in the satellite link, so in image 3 Not reflected in.

[0083] image 3 It is a sequence diagram of an authentication agent method based on satellite communication according to an embodiment of the present invention.

[0084] Step 1, the satellite end station receives the domain name access request sent by the user terminal.

[0085] The satellite end station refers to the ground station closest to the user terminal in the satellite link.

[0086] The domain name requested by the user terminal is carried in the domain name access request. Specifically, the user may use the browser of the user terminal to access a certain website, for example, input www.sina.com in the browser, th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an authentication proxy method, device and equipment. The method includes: intercepting the redirection message sent by the first authentication device to the user terminal; modifying the redirection message and sending it to the user terminal; wherein, modifying the redirection address in the redirection message to the address of the proxy device; receiving the user The terminal sends authentication information according to the modified redirection message; and performs authentication on behalf of the user terminal according to the authentication information. In the present invention, the redirection message is modified to be redirected to the proxy device, and the proxy device acts as the proxy of the user terminal and is responsible for authenticating the user terminal on behalf of the user terminal, reducing the interaction between the user terminal, the first authentication device and the second authentication device, and effectively The authentication delay is reduced, the authentication time is shortened, the authentication efficiency is improved, and the user experience effect is improved.

Description

technical field [0001] The present invention relates to the technical field of authentication, in particular to an authentication proxy method, device and equipment. Background technique [0002] AAA authentication is used to provide security services. AAA authentication includes: authentication (Authentication), authorization (Authorization) and accounting (Accounting). Authentication is to verify the user's identity to determine whether the user is a legitimate user; authorization is to authorize which network services the authenticated user can use; billing is to record the resources used by the user to use the network service, and this information will be used as the basis for billing. [0003] At present, if the user is in a remote area, such as: the sea, desert, forest and other remote areas, the authentication interaction between the user terminal and the remote authentication server will cause a large authentication delay. In remote areas, the user terminal performs...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40
CPCH04L63/0876H04L63/0884H04L63/0892H04L9/40
Inventor 郑占彬
Owner ZTE CORP
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More