Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access authentication method and device

An access authentication and authenticated technology, applied in the field of communications, can solve problems such as unfavorable centralized management and maintenance of the entire network, increase in costs, etc.

Active Publication Date: 2019-03-19
NEW H3C TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the increasing application of WLAN (Wireless LAN, wireless local area network), the traditional AC (AccessCentral, access controller)-FIT (thin) AP (Access Point, access point) network networking model is in the same network, Multiple areas need to be managed independently. For areas with low network maintenance capabilities, it will undoubtedly increase costs, and it is not conducive to centralized management and maintenance of the entire network; it will be replaced by a new generation of WLAN networks with layered thinking

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method and device
  • Access authentication method and device
  • Access authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0055] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with this application. Rather, they are merely examples of apparatuses and methods consistent with aspects of the present application as recited in the appended claims.

[0056] The terminology used in this application is for the purpose of describing particular embodiments only, and is not intended to limit the application. As used in this application and the appended claims, the singular forms "a", "the", and "the" are intended to include the plural forms as well, unless the context clearly dictates otherwise. It should also be understood that the term...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access authentication method and device. The method comprises the following steps: when the local AC receives an association message forwarded by an AP and from a client, ifdetermining that the ESS information of the client is same as the ESS information of the local AC, determining whether the client is the local authenticated client according to a key identifier, if the client has been authenticated, notifying a center AC to modify the access AP of the client; if the client is unauthenticated, requesting the center AC to judge whether the client has been authenticated according to the key identifier; if the center AC determines that the client has been authenticated, modifying the access AP of the client, and feeding back the VLAN information carrying the key and the client to the local AC, thereby enabling the client to perform network access through the existing VLAN information, and realizing the seamless roaming of the client.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to an access authentication method and device. Background technique [0002] With the increasing application of WLAN (Wireless LAN, wireless local area network), the traditional AC (AccessCentral, access controller)-FIT (thin) AP (Access Point, access point) network networking model is in the same network, Multiple areas need to be managed independently. For areas with low network maintenance capabilities, it will undoubtedly increase costs, and it is not conducive to centralized management and maintenance of the entire network; instead, a new generation of WLAN networks with layered thinking. In this new generation network, the Central AC (center) is responsible for the management of the entire wireless network, and the Local AC (local) is responsible for AP access and forwarding data traffic, so that centralized management can be realized in the same network. In su...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W8/20H04W12/06H04W12/08H04W48/08H04W12/0431
CPCH04W8/205H04W12/06H04W12/08H04W48/08
Inventor 吴清根
Owner NEW H3C TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products