Non-aware authentication method and apparatus

A technology of non-perceptual authentication and authentication request, applied in the field of communication, can solve the problems affecting the normal use of legitimate users, instability, billing disputes, etc.

Inactive Publication Date: 2018-06-22
RUIJIE NETWORKS CO LTD
View PDF5 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides a non-perceptual authentication method and device to solve the problems in the prior ar

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-aware authentication method and apparatus
  • Non-aware authentication method and apparatus
  • Non-aware authentication method and apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] Aiming at the problems existing in the prior art that not only affect the normal use of legal users, but also lead to billing disputes due to disconnection or network instability, the embodiment of the present invention provides a non-perceptual authentication method, which is applied to the authentication server In , the flow of the method is as follows figure 1 As shown, the execution steps are as follows:

[0052] S11: After receiving the authentication request message sent by the terminal, determine whether the IP address of the terminal is a dynamic IP address.

[0053] At present, the IP address of the terminal includes static IP address and dynamic IP address. The above method is only applicable to the dynamic IP address, that is, the situation of the dynamic area. Therefore, after receiving the authentication request message sent by the terminal, it is necessary to determine the Whether the IP address is a dynamic IP address.

[0054] S12: If it is determined ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a non-aware authentication method and apparatus. The method comprises the following steps: after an authentication request message sent by a terminal is received, determining whether an Internet Protocol IP address of the terminal is a dynamic IP address; if it is determined that the IP address of the terminal is the dynamic IP address, determining whether a media access control MAC address of the terminal is legal according to fingerprint information of the terminal carried in the authentication request message; and if it is determined that the MAC address of the terminal is legal, authenticating an account number and a password carried in the authentication request message, and sending an authentication response message to the terminal when the account number andthe password pass the authentication. By adoption of the scheme, normal network access of legal users can be ensured, no offline or network instability and other situations occur, and no billing dispute is caused.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a non-perceptual authentication method and device. Background technique [0002] At present, there are two sets of cores in most of the higher education networks, one is the wired core, and the non-aware authentication is enabled, and there is a static Internet Protocol (Internet Protocol, IP) address deployment under the core. The other set is the wireless core, which enables WEB authentication and non-aware authentication, and deploys dynamic IP addresses under this core. The subsequent two sets of cores will be unified, that is, the same core will support non-aware authentication of dynamic and static areas at the same time. [0003] Due to earlier network planning, the phenomenon of Media Access Control (MAC) address spoofing in the network has always existed. MAC address spoofing means that an illegal user modifies the MAC address of a terminal to forge the MAC addr...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/083H04L63/0876
Inventor 吴世奇
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products