Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A terminal trusted access authentication system and method

An access authentication and credible technology, applied in the field of network security management, can solve problems such as network system paralysis and non-compliance of end users, and achieve the effect of reducing network construction cost, easy operation, and solving identity uncertainty.

Active Publication Date: 2018-05-01
CHANGAN UNIV
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] At present, due to the complexity of the network environment, the diversity of network equipment, the diversity of network terminal access technologies, and the non-compliance of end users, the security issues of network border access, which are randomly accessed by terminals, have become increasingly prominent.
The network terminal is the entrance to access and access the network, and a single terminal bad point is enough to cause the paralysis of the entire network system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A terminal trusted access authentication system and method
  • A terminal trusted access authentication system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] The present invention will be further described in detail below with reference to the drawings and embodiments:

[0026] The terminal trusted access authentication system of the present invention includes a user identity authentication module and a terminal access authentication module; the user identity authentication module completes the trusted identity authentication of the terminal user; the user identity authentication module includes a CA user certificate and a CA authentication server; CA authentication The center distributes a USB-Key hardware device for each user. The CA user certificate, private key and basic user information are stored in the USB-Key hardware device; the USB-Key hardware device can set user passwords and has a USB interface. The terminal node trusted access module completes the trusted access authentication of the terminal user; the terminal node trusted access module includes the access authentication switch, the CA authentication server and th...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a terminal credible access authentication system and method. The CA binds the user's public key and identification information and stores them in the electronic certificate, thereby realizing the user's identity authentication; combining data encryption and digital signature technology to ensure Confidentiality, integrity and non-repudiation of user information; the present invention has low requirements on the overall performance of the equipment, which can effectively reduce the cost of network construction; supports multicast services; is compatible with PPP, and has good scalability and adaptability; Ports and uncontrollable ports realize the separation of business and authentication; after the authentication is passed, there is no need to encapsulate data packets, which is highly efficient; different user levels can be mapped to different VLANs to realize the user domain with different permissions Management; it has the advantages of simple implementation, high authentication efficiency, safety and reliability, and easy operation.

Description

Technical field [0001] The invention belongs to the technical field of network security management, relates to a security management and control system, and in particular to a terminal trusted access authentication system and method. Background technique [0002] At present, due to the complexity of the network environment, the diversity of network equipment, the diversity of network terminal access technologies, and the non-compliance of terminal users, the problem of network boundary access security for terminal random access has become increasingly prominent. The network terminal is the entrance to and access to the network, and the dead point of a single terminal is enough to cause the paralysis of the entire network system. The terminal trusted access system is the first and most important line of defense to ensure network security. How to effectively control the secure access of network terminals, build a terminal trusted access authentication control system, and prevent h...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/0823
Inventor 屈立成李坤伦李鹏曹伟孙大跃高小梅张超崔华茹
Owner CHANGAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products