Identification method for user apparatus

A user equipment and technology to be authenticated, applied in the field of network communication, can solve problems such as authentication cannot be completed, achieve the effect of convenient network operation and management, lower requirements, and protect existing investment

Inactive Publication Date: 2004-07-07
HUAWEI TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, some network devices do not allow packet penetration initiated by multicast extended authentication, resulting in the failure to complete the authentication, thus blocking the user's access request

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identification method for user apparatus
  • Identification method for user apparatus
  • Identification method for user apparatus

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] The present invention proposes a method for authenticating user equipment, and its authentication structural block diagram is as follows image 3 As shown, the authentication structural block diagram includes three parts: user equipment, access control equipment, and authentication server. The method for authenticating user equipment includes the following steps:

[0019] (1) First, the user equipment to be authenticated initiates an authentication message with a destination address of "FF-FF-FF-FF-FF-FF" to the access control device;

[0020] (2) After the message receiving module in the access control device receives the above-mentioned authentication message, the adaptation layer in the message receiving module sends the destination address "FF-FF-FF-FF-FF-FF" in the message to " into "01-80-C2-00-00-03";

[0021] (3) The message receiving module sends the authentication message whose destination address is "01-80-C2-00-00-03" to the authentication processing module...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to network communication field, specially relates to a identification method to subscriber equipment. First, the subscriber equipment waiting for identification originates the identification message to the access control equipment at destination address: FF-FF-FF-FF-FF-FF; after the message receiving module in the access control equipment receives the messages, the adaptation layer converts the destination address in the message to '01-80-C2-00-00-03'; the message receiving module sends the identification message that has converted destination address to the identification processing module in the access control equipment; complete identification for the subscriber equipment through the protocol for dialing in user long distance identification between identification process module and identification server. The method can reduce the requirement for subscriber equipment to the network adopting 802.1X identification, make the exiting equipment to use continually in the 802.1X network.

Description

technical field [0001] The invention relates to the technical field of network communication, in particular to a method for authenticating user equipment. Background technique [0002] In the prior art, the local area network defined by the IEEE802 protocol does not provide access authentication. Generally speaking, as long as a user accesses the local area network, he can access devices or resources on the network. However, for applications such as telecommunication access, office LAN, and mobile office, network managers hope to control and configure the access of user equipment. Therefore, a port-based network access control requirement, namely IEEE802.1X ( Hereinafter referred to as 802.1X) protocol. The structural block diagram of the protocol for user authentication is as follows: figure 1 As shown, it can be seen from the figure that the authentication system includes three parts: user equipment, access control equipment and authentication server. [0003] Usually, ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06
Inventor 刘刀桂罗汉军汤杰成
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products