Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Policy-based re-authentication method and device

A technology of re-authentication and strategy, applied in the field of communication, can solve the problems of re-authentication failure, communication failure, re-authentication interaction interruption, etc., and achieve the effect of avoiding the impact

Active Publication Date: 2016-03-30
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

There may be many reasons for the failure of re-authentication. In addition to the replacement of illegal clients and the disconnection of legitimate clients, it may also be caused by a communication failure on the network side between the device and the authentication server, resulting in the interruption of re-authentication interactions.
At present, for re-authentication failures caused by communication failures on the network side, the processing method on the device side is still to revoke the client's authorization and prohibit the client's business traffic from entering the network.
In this case, if the device side revokes the authorization of the client by mistake, the business of the legitimate client will be interrupted, causing great losses to the user.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Policy-based re-authentication method and device
  • Policy-based re-authentication method and device
  • Policy-based re-authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0017] The implementation process of the present invention will be described below in combination with specific embodiments.

[0018] According to the embodiment of the present invention, on the basis of the existing 802.1X re-authentication mechanism, a policy-based re-authentication method is provided for the situation where there is a network-side communication failure between the device end and the authentication server, so that the legitimate client will not In the event of a network failure, authorization is revoked, resulting in service interruption; taking into account both network security and service reliability, thereby improving the applicability of the 802.1X security certification system in scenarios that require relatively high service reliability.

[0019] According to an aspect of an embodiment of the present invention, a policy-based re-authentication method is provided, including:

[0020] 100, configure the re-authentication strategy of the client;

[0021...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention provides a policy-based re-authentication method. In the method, a re-authentication policy of a client side is configured, and then an equipment side performs corresponding re-authentication according to the configured re-authentication policy of the client side. The policy-based re-authentication method provided by the embodiment of the invention has the beneficial effects that by configuring the re-authentication policy, influence on business flow of the legal client side can be prevented in case of network-side communication failure between the equipment side and an authentication server, thus improving the business reliability during the authentication process under the condition of ensuring the safety.

Description

technical field [0001] The present invention relates to the field of communication, in particular to a policy-based re-authentication method and device. Background technique [0002] 802.1X is a port-based network access control protocol developed by the IEEE (Institute of Electrical and Electronics Engineers), which can authenticate and control connected user equipment on ports of Ethernet access devices. The 802.1X authentication system includes three parts: the client (Supplicant), the device (Authenticator) and the authentication server (AuthenticationServer). Authentication interaction is performed between the client and the device through EAPOL (Extensible Authentication Protocol over LAN) messages; the device judges whether to authorize the access port or the MAC address of the client according to the authentication result returned by the authentication server, thereby completing the access control of the client : Only the business traffic of the authenticated client...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
Inventor 杨柳
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products