Coordinate access control system of ternary structure

An access control and peer-to-peer technology, applied in transmission systems, electrical components, user identity/authority verification, etc., can solve the problems of network security, complex process of trust relationship establishment, and limited flexibility of access forms. The effect of high safety and safety performance

Active Publication Date: 2007-06-06
CHINA IWNCOMM
View PDF0 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0012] The purpose of the present invention is to provide a ternary structure peer-to-peer access control system that securely realizes the two-way authentication between the terminal and the network, which not only solves the problem that the flexibility of the access form in the existing binary two-entity structure access control system is limited, access The technical problem that the number of controllers is not suitable for expansion, and solves the technical problem that the process of establishing trust relationship in the existing two-element three-entity structure access control system is complicated and affects network security

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Coordinate access control system of ternary structure
  • Coordinate access control system of ternary structure
  • Coordinate access control system of ternary structure

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The specific structure of the peer-to-peer access control system of the present invention is shown in Figure 4, including a terminal, an access controller and a server. The peer layer (corresponding to the peer layer of the subject) and the authentication method layer (corresponding to the authentication method layer of the subject), the access controller (corresponding to the authenticator) includes the bottom layer (corresponding to the bottom layer of the authenticator), the transport layer ( Transport layer corresponding to the authenticator), encapsulation layer (encapsulation layer corresponding to the authenticator), authenticator layer (authenticator layer corresponding to the authenticator) and authentication method layer (authentication method layer corresponding to the authenticator) , the server includes a transport layer (corresponding to the transport layer of the authentication server), an encapsulation layer (corresponding to the encapsulation layer of th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A method for controlling P2P access of ternary structure includes setting certification method layer on access controller of existed binary three-entity structure and arranging function of carrying out certification according to evidence on certification method layer for forming ternary three-entity structure to make terminal, access controller and server all participate certification so as to directly set up trust relation in once time between terminal and access controller.

Description

technical field [0001] The invention relates to a network access control system, in particular to a ternary structure peer-to-peer access control system. Background technique [0002] The basic function of the network is to provide network services to various terminals. Although terminals can be physically connected to the network, the ones connected to the network are not necessarily authorized legal terminals, and the ones connected to the terminal are not necessarily what it needs. Therefore, before the terminal communicates with the network, authentication and authorization functions are required to identify each other's legitimacy, that is, two-way access control between the terminal and the network is required to ensure the security of communication. [0003] Figure 1 is a schematic diagram of the two-way anti-access control between the terminal and the network. The terminal 1 accesses the network 4 through the access controller 3. Before the terminal 1 starts using th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/32
CPCH04L63/0869
Inventor 赖晓龙曹军铁满霞张变玲
Owner CHINA IWNCOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products