An expansion security authentication method based on 802.1X protocol

A security authentication and protocol technology, used in user identity/authority verification, digital transmission systems, data exchange networks, etc., to solve problems such as software insecurity, theft of authentication information, and the inability of unknown viruses to do anything.

Inactive Publication Date: 2007-07-11
BEIJING UNIV OF TECH
View PDF0 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the client is implanted with a Trojan horse program, when the client program is running, the user's authentication information will be stolen by others, which will pose a threat to the user's security
If the client program is damaged by a virus, then the software itself is not safe, that is to say, it loses the meaning of authenticating the client
Although antivirus software has been installed, there is no guarantee that the client will not be implanted with malicious code
At present, most anti-virus software is very effective in defense against known viruses, but powerless against unknown viruses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • An expansion security authentication method based on 802.1X protocol
  • An expansion security authentication method based on 802.1X protocol
  • An expansion security authentication method based on 802.1X protocol

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] Figure 2 shows the most commonly used client and authentication system in the authentication phase of the protocol process.

[0034] As shown in Fig. 3, the safety authentication method expanded on this basis of the present invention. The main implementation steps are as follows:

[0035] First, before the user is authenticated, the controlled port of the authentication system is closed, and the user cannot access the network. However, the uncontrolled port is always open, but only EAPOL authentication packets are allowed to pass.

[0036] In the initial stage, the client program needs to first check the security of the program itself, including whether the client program has been modified and the correctness of calling the DLL file.

[0037] After the user issues an authentication command, the client program continues to obtain information about the user's operating system. Different operating systems require the corresponding client software to obtain its information. The i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

This invention relates to one extensive safety identification method based on 802. 1X and its method, which adopts identification and monitor idea to need to measure the operation system, virus killing software, customer end identification program and uses the measurement result as identification message with only customer end system meet standard through user codes testing for legal user; if not updating the system.

Description

Technical field [0001] The present invention relates to an authentication method in network access, in particular to an authentication method based on the 802.1X protocol; the present invention measures the integrity of the operating system, antivirus software, and client program of the authentication platform, and the measurement result is used as part of the authentication information. So as to effectively control the degree of client security. Background technique [0002] Nowadays, local area networks often appear in schools, enterprises, and institutions, and their scale is getting bigger and bigger. Some university local area networks may have tens of thousands of users at the same time. After more than 20 years of development, Ethernet technology has gradually become the most important networking technology for local area networks. Ethernet has the characteristics of simple and convenient use, low price, and high speed. At present, the speed of Ethernet has reached gigabit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L12/56H04L9/32H04L12/28
Inventor 赖英旭李晨张建标张书杰李健
Owner BEIJING UNIV OF TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products