Supercharge Your Innovation With Domain-Expert AI Agents!

Identity authentication method, identity authentication system and related equipment

A technology of identity authentication and identity information, applied in the field of communications, can solve the problems of access links not being authenticated and security not being guaranteed, and achieve the effect of ensuring security.

Active Publication Date: 2020-04-03
HUAWEI TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, in the virtual access router scenario, using this method for authentication will make the access link between the enterprise user side and the vAR unauthenticated, and the security will not be guaranteed.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity authentication method, identity authentication system and related equipment
  • Identity authentication method, identity authentication system and related equipment
  • Identity authentication method, identity authentication system and related equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0052] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0053] The embodiment of the present invention provides an identity authentication method, which is applied to a network system including a virtual access router, a client device and a PPPOE server, and is used to realize the authentication and authorization of dial-up enterprise users in the virtual access router scenario .

[0054] Appear in the embodiment of the present invention:

[0055] PADI is the abbreviation of PPPoE Active Discovery Initiation, which means that...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses an identity authentication method and related equipment, which are used for authenticating and authenticating a dialing enterprise user in a virtual access router scene. The method provided by the embodiment of the invention comprises the following steps: only when the virtual access router determines that the received first identity information of the user in the first PADI broadcast message sent by the client is matched with the identity of the virtual access router, the virtual access router sending a second PADI broadcast message to the PPPOE server to request the PPPOE server for service, and the virtual access router also needing to send a second PADO response message carrying the routing identity information to the client device for verification of the routing identity information; and after the virtual access router establishes a first session with the PPPOE server and a second session with the client device, forwarding user second identity information sent by the client device to the PPPOE server for identity authentication through the first session and the second session.

Description

technical field [0001] The invention relates to the communication field, in particular to an identity authentication method, an identity authentication system and related equipment. Background technique [0002] The traditional access router (AR) is placed on the user (enterprise) side, and the user performs Point-to-Point Protocol over Ethernet (PPPoE) dial-up on the AR, and the operator's network equipment authenticates and authenticates the user. After passing the authentication, the Internet Protocol (IP) address for the interconnection between public networks will be assigned to its Wide Area Network (WAN) port. Among them, the PPPoE protocol provides a standard for connecting multiple hosts to a remote broadband access server in an Ethernet network. Its essence is to establish a point-to-point tunnel on the Ethernet, with functions of user authentication and IP address notification. Perform PPPoE dial-up on the traditional AR to complete user authentication, and the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06
CPCH04L63/08
Inventor 包德伟胡寅亮魏启坤潘栋成
Owner HUAWEI TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More