Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and network authentication server for controlling client terminal access to network appliance

A technology for authentication server and client control, applied in the field of network security, it can solve the problems of complicated user operation server control, etc., and achieve the effect of effective and convenient access.

Inactive Publication Date: 2008-07-16
HUAWEI TECH CO LTD +1
View PDF0 Cites 55 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the prior art, if a user wants to access another network device after accessing one network device in the network, in order to ensure security, the server needs to repeat a strict authentication process on the user according to the request sent by the network device to authenticate the user. Complex authentication, user operation and server control are more complex

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and network authentication server for controlling client terminal access to network appliance
  • Method and network authentication server for controlling client terminal access to network appliance
  • Method and network authentication server for controlling client terminal access to network appliance

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] Embodiments of the present invention provide a method for controlling client access to network equipment and a network authentication server.

[0032] The main processing flow of the method described in the embodiment of the present invention is as follows: the authentication server in the network and the client of the user first use the public key cryptosystem to perform two-way identity authentication, and the authentication server assigns a temporary ID to the client of the user And the corresponding expiration date, as well as permission information. Then, the client controlling the user uses the temporary ID to access devices in the network within the validity period.

[0033] The method described in the embodiment of the present invention is applicable to various small local area networks, for example, a home network.

[0034] Taking a home network as an example, the processing flow of the embodiment of the method of the present invention mainly includes the foll...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a method for controlling client to access network equipment and a network authentication server. The method mainly comprises the following steps that: an authentication server in a network carries out identity authentication to a user through a user client ; after the user passes the identity authentication, the authentication server allocates authentication information to the user client ; the authentication information comprises a temporary ID and corresponding validity; the authentication server controls the user client to access equipment in the network according to the authentication information allocated to the user client. The method and the network authentication server of the present invention can realize authentication server safety in the network and control the access of user terminals to the equipment in the network effectively and conveniently.

Description

technical field [0001] The invention relates to the field of network security, in particular to a method for controlling client access to network equipment and a network authentication server. Background technique [0002] The structural diagram of the general model of the home network proposed in ITU (International Telecommunication Union, International Telecommunication Union) is as follows figure 1 shown. According to the location and function of each entity, figure 1 The shown home network models can be divided into seven types, namely: remote user, remote terminal, application server, secure home gateway, home application server, home user, and home device. Among them, household devices are divided into the following three types of devices: A, B, and C according to different functions. [0003] Class A equipment: with control functions; for example: computers, set-top boxes [0004] Class B equipment: with bridging function; for example: switch (switch), hub (hub) ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L9/32
Inventor 辛阳李超刘云陈进
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products