A 802.1x authentication method
A technology of network authentication and external authentication, which is applied in the field of network communication, can solve problems such as inability to control user authentication, and achieve the effect of meeting diverse needs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0027] Specific embodiments of the present invention will be described in detail below with reference to the accompanying drawings.
[0028] image 3 A structural block diagram of the authentication execution system adopted in the present invention is shown. like image 3 As shown, the authentication execution system includes: user-side receiving and sending processing device 1 , protocol processing module 2 , MAC address maintenance module 3 , central processing unit (CPU) 4 and network-side receiving and sending processing module 5 .
[0029] The functions of the receiving and sending processing module 1 on the user side are: receiving messages from the user equipment, buffering them, and then sending them to the protocol processing module for processing; encapsulating the messages on the network side and forwarding them to the user equipment; the function of the protocol processing module 2 Yes: Analyze the protocol of the packet, and perform operations such as handing ov...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com
