Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access authentication method of 802.1x

A technology for access authentication and authentication system, which is applied in the field of 802.1x VMI logic port control and address acquisition, can solve the problems that restrict the application of 802.1X authentication mode, cannot solve address conflicts well, and restrict the development of wireless broadband networks. Eliminate single point of failure, eliminate network authentication and billing bottlenecks, and facilitate multi-service operations

Inactive Publication Date: 2006-10-11
南京联创网络科技有限公司
View PDF0 Cites 36 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0016] (1) Many switch manufacturers use 802.1x authentication on the terminal switch, the authentication position is too low, and network maintenance is very troublesome
[0017] (2) Many switches do not support logical port control, but only support physical port control. Once multiple users are connected to a physical port, once the port is closed, all users will not be able to get services;
[0018] (3) Even if there is logical port control, the user's MAC is often used as the control object, and whether the access of the MAC address is controlled as the control means, the flexibility and security are very poor;
[0019] (4) An external DHCP server is used. After the port is opened, the terminal obtains an address from the DHCP server. On the one hand, it relies on an external DHCP server, and on the other hand, it cannot solve the problem of address conflicts.
[0020] The above problems seriously restrict the application of 802.1X authentication mode in broadband networks, and also restrict the development of wireless broadband networks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method of 802.1x
  • Access authentication method of 802.1x
  • Access authentication method of 802.1x

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0056] (1) The client initiates an 802.1x authentication request message, which is transparently transmitted to the access control device (BAS) through the Layer 2 network

[0057] (2) The BAS initiates an authentication request to the RADIUS server through the RADIUS CLIENT

[0058] (3) If the authentication is passed, the BAS returns an 802.1x authentication success message to the client

[0059] (4) The client initiates a DHCP address allocation request message

[0060] (5) Layer 2 network transparently transmits DHCP message to BAS

[0061] (6) The BAS assigns an address to the client. The client IP address allocation policy is specified by the radius server in the authentication pass response message. If the radius server does not specify a user address allocation policy, it is determined according to the user's domain. The DHCP server responds to the user's DHCP request according to the user's address allocation policy, and completes the assignment of the client's IP ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The disclosed 802.1x access certification method comprises: applying a RADIUS server for certification to store user information, applying user VLAN+MAC+IP as logical port, and building the certification process by client, certification system and server; wherein, applying only the 802.1X of EAPOL till certification success to switch as authorized state; once past the certification, monitoring user flow by said parameters. This invention realizes the bonding certification for multi MACs, multi IP, exchanger physical port, exchanger VLAN, exchanger managed IP, user name and cipher.

Description

technical field [0001] The invention belongs to an 802.1x authentication method in broadband IP data communication, in particular to a method for 802.1x VMI logic port control and address acquisition. Background technique [0002] There are already many methods for broadband access authentication: such as PPPOE access authentication, users access via LAN or ADSL, enter account number and password when logging in, directly initiate a login request to the access platform in PPP mode, and access the platform Send the login information to the authentication platform to complete the access authentication. PPPOE authentication is a very mature authentication method, which has very good user management, flow control, user security and other performances, but it cannot penetrate the three-tier network, and software needs to be installed on the client side, which is complicated to maintain. [0003] Web access authentication. During user authentication, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/06H04L12/28H04L29/12
Inventor 顾恺顾杰宦林英莫蕴岚宋俊骏
Owner 南京联创网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products