Network access device

A network access device and server-side technology, which is applied in the field of network access devices, can solve problems such as hidden dangers in network security and lack of network security protection measures, and achieve the effects of improving security performance, solving authentication and security problems, and being easy to use

Inactive Publication Date: 2019-03-01
智强通达科技(北京)有限公司
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, 802.1X technology is a "authenticated and forget" technology, that is, it only conducts identity authentication when establishing a connection. Security poses hidden dangers
[0004] The existing 802.1X standard defines a "client-server" (Client-Server) mode to restric

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access device
  • Network access device
  • Network access device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0027] This embodiment provides a network access device. The network access device includes a client device and a server device. The process authentication is performed between the client device and the server device by adding random values. If the process authentication passes, the The service message is passed, and at the same time, re-authentication is performed between the client device and the server device, and if the re-authentication fails, the client re-authenticates.

[0028] Specifically, the server-side device adds an entry of MAC, port number, user name and password of the client; the password in the entry of the password is stored using the RC4 encryption method; the client device adds the MAC of the server, port No., user name and password, and the password is saved using the RC4 encryption method. After the authentication is completed, the client can access the server.

[0029] Specifically, the re-authentication includes defining a threshold value, the server...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a network access device, and solves the technical problem of lack of network security protection measures after initial authentication of a user. The device comprises client equipment and server equipment; process authentication is performed by adding a random value between the client equipment and the server equipment, and when the process authentication is passed, a service message is allowed to be passed; and meanwhile, re-authentication is also carried out between the client equipment and the server equipment, and if the re-authentication fails, a client re-carriesout the process authentication. By adopting the technical scheme, the problem is better solved; and the device can be applied to a communication technology.

Description

technical field [0001] The invention relates to the field of communication technology, in particular to a network access device. Background technique [0002] In IEEE 802 LAN, as long as the user can connect to the network device, it can be used directly without authentication and authorization. In this way, an unauthorized user can enter the network through devices connected to the LAN without any hindrance. This poses a potential hidden danger to network security. Network security is a must for all network equipment manufacturers. [0003] The Port-Based Network Access Control proposed by IEEE, that is, the 802.1X solution, is widely used as a LAN access method. 802.1X utilizes the physical access characteristics of IEEE 802 LAN to provide an authentication and authorization scheme for accessing the LAN. However, 802.1X technology is a "authenticated and forget" technology, that is, it only conducts identity authentication when establishing a connection. Safety brings...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06
CPCH04L63/0428H04L63/08H04L63/083H04L63/0869H04L63/0876H04L63/10
Inventor 邓耀勇
Owner 智强通达科技(北京)有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products