User authentication method for extensible and distributed wireless local area network (WLAN)

A network user and authentication method technology, applied in the field of network user authentication, can solve problems such as large investment, and achieve the effects of reduced investment, simple engineering installation and maintenance, and functional expansion

Inactive Publication Date: 2014-12-31
赵霏
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, because the traditional method often requires dedicated line access to complete, it still requires a large investment, and is not suitable for small and medium-sized enterprises or special places to deploy WLAN network coverage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • User authentication method for extensible and distributed wireless local area network (WLAN)
  • User authentication method for extensible and distributed wireless local area network (WLAN)
  • User authentication method for extensible and distributed wireless local area network (WLAN)

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0047] A chain catering company has opened many restaurants across the country, and each restaurant needs to deploy a wireless network in order to provide Internet services to customers. Customers need to pass identity authentication to obtain Internet service qualifications. If the traditional centralized authentication scheme is used, each restaurant needs a dedicated network connection to a remote RADIUS server, and due to the large number of users, the RADIUS server requires a higher configuration. The investment in this way is too large, far beyond the budget of the catering company. At present, the restaurant uses a distributed authentication scheme. It is enough to deploy an authentication gateway in each restaurant to connect to a user management server with common configuration, without the need for expensive dedicated network lines and high-configuration RADIUS servers. Compared with the traditional centralized authentication scheme, the equipment investment of the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a user authentication method for an extensible and distributed wireless local area network (WLAN). The method has the characteristics that investment is small, and a user conveniently uses the network. The technical scheme is that the user authentication method for the extensible and distributed WLAN sequentially comprises the following steps that: 1) an extensible network user authentication system is established in the following way: a plurality of authentication gateways are directly connected with a user management server which stores all user information through an external network, and a wireless user terminal is subjected to the authentication process in one of the authentication gateways through a wireless access point (AP); and 2) the user management server generates a peer-to-peer (P2P) network through an external network Internet protocol (IP) and a port mapping table organization authentication gateway, and the authentication gateways are in transmission control protocol (TCP) long connection to form a virtual unified authentication gateway.

Description

technical field [0001] The invention relates to a network user authentication method, in particular to a scalable and distributed network user authentication method. Background technique [0002] The traditional network user authentication system architecture is composed of multiple 802.1x gateway devices and one or more RADIUS servers. 802.1x is an IEEE Std 802.1x-2001 port-based access control protocol, which can overcome many problems caused by PPPoE (point-to-point protocol over ethernet) and avoid the huge investment brought by the introduction of broadband access servers. The 802.1x protocol restricts unauthorized users / devices from accessing the LAN / WAN through access ports. Before obtaining various services provided by switches or LANs, 802.1x authenticates users connected to switch ports. Before the authentication is passed, 802.1x only allows EAPOL (Extensible Authentication Protocol over LAN) data to pass through the switch port to which the device is connected....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06
Inventor 赵霏
Owner 赵霏
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products