Method for performing forced door authentication on user in 802.1X access mode

An access method and access controller technology, applied in user identity/authority verification, digital transmission systems, electrical components, etc., to achieve the effect of effective service bearing

Inactive Publication Date: 2005-01-26
CHENGDU HUAWEI TECH
View PDF0 Cites 13 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the 802.1X access authentication method cannot launch the operator's promotional page to the user during or after the user authentication process like the WEB authentication method or PPPOE access authentication method.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for performing forced door authentication on user in 802.1X access mode
  • Method for performing forced door authentication on user in 802.1X access mode
  • Method for performing forced door authentication on user in 802.1X access mode

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0013] Figure 1 schematically illustrates the existing EAP protocol. Refer to Figure 1. The fields and their meanings and values ​​are as follows:

[0014] EAPOL Flag: is the flag of the extensible authentication protocol carried by the LAN, and its value is 0x888E

[0015] Version: Version number, its value is 0x01

[0016] Packet Type: packet type, its value and meaning are

[0017] 0 EAP-Package

[0018] 1 EAPOL-Start

[0019] 2 EAPOL-login refused

[0020] 3 EAPOL-Password

[0021] 4 EAPOL-Package-ASF-Warning

[0022] Packet Body Length: This value field is two bytes, indicating the length of the EAPOL packet. The packet body includes DestMAC (sink MAC), SourMAC (source MAC), VLAN Tagged (virtual local area network tag), Version (version), and Packet Type (Packet Type), Packet Body Length (Packet Body Length) and all subsequent data.

[0023] Code: Code, its value and meaning are

[0024] 1 request

[0025] 2 Answer

[0026] 3 success

[0027] 4 failed

[0028] Identifier: Ide...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method of forcing door attestation on user access in 802.1X accessing mode. The method firstly extends the existing EAP (extendable attestation protocol), thus increasing message types of EAP URL (united resource locator). On this basis, it includes the steps: receiving user connection establishing requirement message by accessing controller, attesting user validity: if the authentication succeeds, notify the user to log on and send EAP-URL message to the user. It provides an effective extension for the existing 802.1X service, thus realizing more effective service supporting.

Description

Invention field [0001] The invention relates to an access authentication method used in a data communication network, in particular to a method for compulsory portal authentication for user access in an 802.1X access mode. Background technique [0002] In the broadband access network, the user's access needs to be authenticated. At present, there are mainly WEB (World Wide Web) authentication methods, PPPOE (Point-to-Point Protocol over Ethernet) authentication methods, and 802.1X access authentication methods. [0003] Among them, the WEB authentication method can launch the operator's propaganda page to the user on the WEB authentication webpage, so as to realize the propaganda of the operator. The access authentication method of PPPOE uses PADM (PPPOE Effective Discovery Message) messages in the PPPOE protocol to push the operator's promotional page to the user after the user is authenticated. However, the 802.1X access authentication method cannot push the operator's promotio...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L9/32H04L12/24H04L29/06
Inventor 侯超吴局业许岗李教峰
Owner CHENGDU HUAWEI TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products