WO2003081839A1 - Procede d'etablissement d'une liaison entre le dispositif d'acces au reseau et l'utilisateur mettant en oeuvre le protocole 802.1x - Google Patents

Procede d'etablissement d'une liaison entre le dispositif d'acces au reseau et l'utilisateur mettant en oeuvre le protocole 802.1x Download PDF

Info

Publication number
WO2003081839A1
WO2003081839A1 PCT/CN2003/000203 CN0300203W WO03081839A1 WO 2003081839 A1 WO2003081839 A1 WO 2003081839A1 CN 0300203 W CN0300203 W CN 0300203W WO 03081839 A1 WO03081839 A1 WO 03081839A1
Authority
WO
WIPO (PCT)
Prior art keywords
client
handshake
access device
network access
message
Prior art date
Application number
PCT/CN2003/000203
Other languages
English (en)
French (fr)
Inventor
Ruixin Lu
Original Assignee
Huawei Technologies Co., Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co., Ltd filed Critical Huawei Technologies Co., Ltd
Priority to BR0308387-0A priority Critical patent/BR0308387A/pt
Priority to AU2003227166A priority patent/AU2003227166A1/en
Publication of WO2003081839A1 publication Critical patent/WO2003081839A1/zh
Priority to US10/942,306 priority patent/US20050080921A1/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/16Implementing security features at a particular protocol layer
    • H04L63/162Implementing security features at a particular protocol layer at the data link layer

Definitions

  • the invention relates to a method for realizing a handshake between a network access device and a client, and in particular, it is based on
  • the client's network access control is usually performed in accordance with the port-based network control protocol 802.1X.
  • the accessing client is authenticated and controlled at the physical access level of the network device, that is, the accessing client is authenticated and controlled at the port of the Ethernet switch or broadband access device. control.
  • User equipment connected to this type of port can access resources in the network if it can pass authentication; if it cannot pass authentication, it cannot access resources in the network.
  • FIG 2 for the architecture of 802. IX.
  • the architecture includes three parts: a client part, a network access device part, and an authentication server part.
  • the user access layer device needs to implement the 802.
  • IX network access device side part and the client part is generally installed in the user PC; the authentication server part generally resides in the operator's billing, authentication, and authorization center.
  • the client and the network access device run an authentication protocol (EAP0L protocol) between the client and the device defined by 802.IX; the device and the authentication server also run the extended authentication protocol between the device and the authentication server (EAP protocol).
  • EAP0L protocol authentication protocol
  • EAP protocol extended authentication protocol between the device and the authentication server
  • An object of the present invention is to provide a method for implementing a handshake between a network access device based on the 802. IX protocol and a client.
  • the method can effectively solve the network charging and security problems based on the 802. IX protocol.
  • a method for implementing a handshake between a network access device based on the 802. IX protocol and a client includes:
  • the client sends an authentication request including the client address and the agreed multicast address to the network access device.
  • the network access device records the client address according to the authentication request message, and After the client is successfully authenticated, it sends a handshake message to the client according to the handshake interval. After receiving the handshake message, the client sends a handshake response message to the network access device.
  • Step (2) The network access device sends a handshake message to the client to send a request authentication message (EAP-Request / Identity) or address resolution protocol (APR, Address Resolve Protocol) using the extended authentication protocol of the 802.1X protocol. ) Request for authentication (ARP-Request).
  • EAP-Request / Identity or address resolution protocol (APR, Address Resolve Protocol)
  • ARP-Request Request for authentication
  • the method further includes:
  • the client After the client is successfully authenticated, when the network access device fails to receive the handshake response packet sent by the client more than the specified number of times during the handshake interval, the client goes offline.
  • the client After the client is successfully authenticated, when the client fails to receive the handshake packet from the network access device more than the specified number of times within the handshake interval, it prompts whether to reconnect to the network.
  • the present invention uses the access device address and the client address in the authentication request message sent by the client to the network access device, after the client successfully authenticates, it sends a handshake message to the client according to the handshake interval. After receiving the handshake message, a handshake response message is sent to the network access device, and the above message uses the 802.1X protocol extended authentication protocol request authentication message (EAP-Request / Identity) and the 802.1X protocol extension EAP-Response / Identity or address of the authentication protocol Parse the ARP-Reques t and ARP-Response messages of the protocol. In this way, after extending the handshake mechanism on the device side, it can still support standard 802.
  • IX clients such as Windows XP
  • Windows XP Windows XP
  • the device can detect the status of the client in time to stop billing and avoid billing disputes.
  • the re-authentication mechanism has a long time interval. Therefore, the client may be spoofed during the re-authentication interval. If the re-authentication mechanism is used to prevent client spoofing, the re-authentication interval must be reduced to a lower level, such as seconds.
  • FIG. 1 is a flowchart of an embodiment of a method according to the present invention
  • Figure 2 is an architecture diagram of the 802. IX protocol.
  • the essence of the present invention is to expand the use of the standard 802. IX protocol, and use standard protocol messages to implement a re-authentication-compatible handshake mechanism, so that when the client is abnormal, the access device can actively discover and automatically stop charging You can also record and identify the client The physical address, thus identifying ⁇ -spoofing users.
  • FIG. 1 is a flowchart of an embodiment of a method according to the present invention.
  • a handshake interval When a client needs to access the network, in step 1, an authentication request message including a client address and an agreed multicast address is sent to the network access device; this step It is essentially a step of sending an authentication request message during the client authentication process.
  • the above message is an EAP0L protocol message.
  • the network access device records the client address according to the authentication request message. Simultaneously with this step, the client's authentication operation is performed. Since the handshake operation between the access device and the client can only be performed after the client has passed the authentication, it is determined in step 3 whether the client's authentication is successful.
  • the access device sends a handshake packet to the client in unicast mode at the client address recorded in step 1 according to the set handshake interval in step 4.
  • the client is receiving After the handshake message is received, a handshake response message is also sent to the network access device according to the address of the access device according to the set handshake interval.
  • the EAP message handshake type is a request for an authentication message (EAP-Reques t / Identi ty) sent by the network access device using the 802. IX extended authentication protocol, and the client responds with a handshake response message of 802. IX protocol.
  • Response Authentication Message of Extended Authentication Protocol (EAP-Response / Identity)
  • the ARP message handshake is an authentication request message sent by the device using the ARP protocol.
  • ARP-Reques t the corresponding client response is ARP-Response.
  • step 5 the access device and the client separately perform a handshake operation. This step For the access device, it is necessary to continue to send handshake packets according to the set handshake interval.
  • the network access device fails to receive a handshake response packet from the client within the handshake interval, it exceeds the specified Times, for example, 3 times, the client is considered to be offline, the client is offline, and the charging stop operation is completed during the offline process.
  • step 5 the operation described in step 5 must continue to send handshake response packets at the set handshake interval. If the client fails to receive the network access device within the handshake interval, for example, 5 seconds If the number of handshake messages sent exceeds the specified number of times, for example, three times, they are considered to be offline, so they are prompted to choose whether to reconnect to the network.
  • the network access device indicated in the embodiment shown in FIG. 1 is a network switch, such as an Ethernet switch.
  • the method for implementing a handshake between a network access device and a client of the present invention is compatible with the client's authentication.
  • the present invention uses the address of the access device and the client provided by the client's authentication process Information, after the client authentication is passed, the handshake operation between the network access device and the client continues. Since the handshake operation uses standard messages defined in the 802.IX protocol or the ARP protocol messages generally supported by the client, the client does not need to make any changes after the above handshake operation is extended on the 802.IX access device. , It can support the access device side of the extended handshake function.

Description

基于 802. IX协议的网络接入设备与客户端握手的实现 方法 技术领域
本发明涉及网络接入设备与客户端握手的实现方法,尤其是基于
802. IX协议的宽带接入网络中的网络接入设备与客户端握手的实现 方法。
背景技术
目前的宽带接入网络中, 通常依据基于端口的网络控制协议 802. IX 完成客户端的网络接入控制。 在客户端接入网絡过程中, 在 网絡设备的物理接入级对接入的客户端进行认证和控制,也就是在以 太网交换机或宽带接入设备的端口对接入的客户端进行认证和控制。 连接在该类端口上的用户设备如果能通过认证,就可以访问网络内的 资源; 如果不能通过认证, 则无法访问网络内的资源。 802. IX的体 系结构参考图 2。 该体系结构包括三个部分: 客户端部分、 网络接入 设备部分和认证服务器部分。 用户接入层设备需要实现 802. IX的网 络接入设备端部分, 客户端部分一般安装在用户 PC中; 认证服务器 部分一般驻留在运营商的计费、 认证、 授权中心。 客户端与网络接入 设备之间运行 802. IX 定义的客户端与设备端之间的认证协议 ( EAP0L协议);设备端与认证服务器之间同样运行设备端与认证服 务器之间的 扩展认证协议( EAP协议)。 网络接入设备部分内部有受 控端口和非受控端口, 非受控端口始终处于双向连通状态, 主要用来 传递 EAPOL协议帧, 可保证客户端始终可以发出或接受认证; 受控 端口只有在认证通过的状态下才打开, 用于传递网络资源和服务; 受 控端口可配置为双向受控、仅输入受控两种方式, 以适应不同的应用 环境。
由上述可知, 在基于 802. IX协议的网络接入中只能实现客户端 的重认证, 而无法实现接入设备与客户端之间的握手, 因此将导致运 营网络中存在一些严重的缺陷:一是由于在运营网络中时长的统计是 根据用户认证通过和注销的间隔时间来计算的, 这样, 当客户端的异 常关机或者客户端运行异常, 都将导致客户端无法发出注销消息, 进 而导致客户端异常情况下按时长计费的偏差。二是导致客户端仿冒问 题, 例如, 一个客户端认证通过后, 未注销直接关机, 另一个客户端 接入后可能顶替前一个客户端访问网络。三是当设备端出现故障时不 会提示用户网络故障。
发明内容
本发明的目的在于提供一种基于 802. IX协议的网络接入设备与 客户端握手的实现方法, 使用该方法可以有效解决基于 802. IX协议 的网络计费、 安全问题。
为达到上述目的, 本发明提供的基于 802. IX协议的网络接入设 备与客户端握手的实现方法, 包括:
( 1 )客户端向网络接入设备发出包括客户端地址和约定组播地 址的认证莆求 4艮文;
( 2 ) 网络接入设备根据上述认证请求报文记录客户端地址, 在 客户端认证成功后, 按照握手时间间隔向客户端发出握手报文, 客户 端在收到握手报文后, 向网络接入设备发出握手响应报文。
步骤(2)所述网络接入设备向客户端发出握手报文为发出采用 802. IX 协 议 的 扩 展 认 证 协 议 的 请 求 认 证 报 文 (EAP- Request/Identity)或地址解析协议(APR, Address Resolve Protocol ) 的请求认证报文( ARP- Request )。
步骤( 2 )所述客户端向网络接入设备发出握手响应报文为发出 采用 802. IX 协议的扩展认证协议的 认证响应 4艮文 ( EAP-Response/Identity ) 或地址解析协议的认证响应^ =艮文 ( ARP-Reponse)。
所述方法还包括: ,
在客户端认证成功后,当网 入设备在握手时间间隔内不能收 到客户端发出的握手响应报文超过规定的次数, 进行客户下线处理。
在客户端认证成功后,当客户端在握手时间间隔内不能收到网络 接入设备发出的握手报文超过规定的次数,发出是否重新接入网络的 提示。
由于本发明利用客户端向网络接入设备发出的认证请求报文中 的接入设备地址和客户端地址,在客户端认证成功后, 按照握手时间 间隔向客户端发出握手报文,客户端在收到握手报文后立刻向网络接 入设备发出握手响应报文, 而且上述报文采用 802. IX协议的扩展认 证协议的请求认证报文(EAP-Request/Identity)和 802. IX协议的 扩展认证协议的响应认证报文(EAP- Response/Identity )或者地址 解析协议的 ARP- Reques t和 ARP-Response报文, 这样, 在设备端扩 展出握手机制后,仍然能够支持标准的 802. IX客户端,如 WindowsXP, 避免了大量更换客户端软件造成的困难和费用; 当客户端出现异常情 况时, 例如计算机死机、 掉电或异常关机, 设备端可以及时检测客户 端的状态, 从而停止计费, 避免造成计费纠纷; 另外, 原有的 802. IX 体系定义的重认证机制的时间间隔较长, 因此在重认证间隔内,客户 端存在仿冒的可能, 如果利用重认证机制来防止客户端仿冒, 必须将 重认证间隔时间降到较低的程度, 例如秒级, 由于在运营网络上由于 存在大量的客户端, 大量的认证报文将淹没认证服务器, 造成资源拥 塞, 实际上是不可行的, 而本发明采用的 EAP方式的握手报文与重认 证发起报文完全相同,设备端根据状态机状态的不同区分是重认证还 是握手, 做到完全兼容 802. IX协议描述的重认证机制, 同时网络设 备端和客户端之间握手的实现, 可以及时发现仿冒的客户端,从而可 以提高网络的安全度。
附图说明
图 1是本发明所述方法实施例流程图;
图 2是 802. IX协议的体系结构图。
具体实施方式
下面结合附图和实施例对本发明作进一步详细的描述。
本发明的实质在于扩展了标准 802. IX协议的使用方式, 利用标 准协议报文实现了与重认证兼容的握手机制, 使得当客户端异常时, 接入设备能主动发现, 并自动停止计费, 同时还可以记录辨识客户端 的物理地址, 从而识別^ -冒用户。
图 1是本发明所述方法实施例流程图。 按照图 1实施本发明, 首 先要设定握手时间间隔, 当客户端需要接入网络时, 在步骤 1向网络 接入设备发出包括客户端地址和约定组播地址的认证请求报文;该步 驟实质上为客户端认证过程中发出认证请求报文的步骤。上述报文就 是 EAP0L协议报文。 然后在步骤 2, 网络接入设备根据上述认证请求 报文记录上述客户端地址。 与本步骤同时进行的是客户端的认证操 作,由于只有在客户端认证通过后才能进行接入设备与客户端之间的 握手操作, 因此在步骤 3判断客户端的认证是否成功, 如果未成功, 同时结束认证和握手操作, 如果客户端认证成功, 则在步骤 4接入设 备按照设定的握手时间间隔按照步骤 1 记载的客户端地址以单播方 式向客户端发出握手报文, 客户端在收到握手报文后, 也按照设定的 握手时间间隔按照接入设备的地址向网络接入设备发出握手响应报 文。本步骤中的网络接入设备向客户端发出握手报文有两种类型: EAP 艮文握手和 ARP报文握手;
EAP报文握手类型为网络接入设备发出采用 802. IX协议的扩展 认证协议的请求认证报文(EAP- Reques t/Identi ty ), 所述客户端回 应握手响应报文为 802. IX 协议的扩展认证协议的响应认证报文 ( EAP - Response/Ident i ty )
ARP 报文握手为采用 ARP 协议的设备端发出的请求认证报文
( ARP - Reques t ), 对应的客户端响应 艮文为 ARP - Response。
在步骤 5接入设备和客户端分别进行握手的处理操作。 该步驟 所述的操作对于接入设备来说,要继续不断地按照设定的握手时间间 隔发送握手报文,当网络接入设备在握手时间间隔内不能收到客户端 发出的握手响应报文超过规定的次数,例如 3次,则认为客户端离线, 进行客户下线处理, 在下线处理过程中完成计费停止操作。
步驟 5所述的操作对于客户端来说,也要继续不断地按照设定的 握手时间间隔发送握手响应报文, 如果客户端在握手时间间隔内, 例 如 5秒, 不能收到网络接入设备发出的握手报文超过规定的次数, 例 如 3次, 则认为自己离线, 因此发出是否重新接入网络的提示信息供 操作者选择。
图 1所述实施例指出的网络接入设备为网络交换机,例如以太网 交换机。
从图 1所述实施例可知,本发明的网络接入设备与客户端握手的 实现方法与客户端的认证过是相兼容的,本发明利用了客户端的认证 过程提供的接入设备和客户端的地址信息, 在客户端认证通过后, 继 续进行网络接入设备与客户端握手的操作。 由于握手操作采用的是 802. IX协议中定义的标准报文或客户端普遍支持的 ARP协议报文, 因此在 802. IX接入设备端扩展了上述握手操作后, 客户端不需要做 任何修改, 就可以支持扩展握手功能的接入设备端。

Claims

权 利 要 求
1、一种基于 802. IX协议的网络接入设备与客户端握手的实现方 法, 包括:
( 1 )客户端向网絡接入设备发出包括客户端地址和约定组播地 址的认证请求艮文;
( 2 ) 网络接入设备根据上述认证请求报文记录客户端地址, 在 客户端认证成功后,按照握手时间间隔向客户端发出握手报文, 客户 端在收到握手报文后, 向网络接入设备发出握手响应报文。
2、 根据权利要求 1所述的网络接入设备与客户端握手的实现方 法, 其特征在于: 所述方法还包括设定握手时间间隔。
3、 根据权利要求 2所述的网络接入设备与客户端握手的实现方 法, 其特征在于: 步骤(2 ) 中网络接入设备以单播方式向客户端发 出握手报文。
4、 根据权利要求 1、 2或 3所述的网絡接入设备与客户端握手 的实现方法, 其特征在于: 步骤(2 )所述网络接入设备向客户端发 出握手报文为发出采用 802. IX协议的扩展认证协议的请求认证报文 ( EAP-Reques t/Ident i ty )。
5、 根据权利要求 4所述的网络接入设备与客户端握手的实现方 法, 其特征在于: 步骤(2 )所述客户端向网络接入设备发出握手响 应报文为发出采用 802. IX 协议的扩展认证协议的认证响应报文 ( EAP- Response/Ident i ty )。
6、根据权利要求 5所述的网络接入设备与客户端握手的实现方 法, 其特征在于所述方法还包括: 在客户端认证成功后, 当网络接入 设备在握手时间间隔内不能收到客户端发出的握手响应报文超过规 定的次数, 进行客户下线处理。
7、 根据权利要求 6所述的网络接入设备与客户端握手的实现方 法, 其特征在于所述方法还包括: 在客户端认证成功后, 当客户端在 握手时间间隔内不能收到网.络接入设备发出的握手报文超过规定的 次数, 发出是否重新接入网络的提示。
8、 根据权利要求 7所述的网络接入设备与客户端握手的实现方 法, 其特征在于: 所述网络接入设备为网絡交换机。
9、 根据权利要求 1、 2或 3所述的网络接入设备与客户端握手 的实现方法, 其特征在于: 步骤(2 )所述网络接入设备向客户端发 出握手才艮文为发出采用地址解析协议的请求认证报文 ( ARP- Reques t )。
10、 根据权利要求 9所述的网络接入设备与客户端握手的实现 方法, 其特征在于: 步骤( 2 ) 所述客户端向网络接入设备发出握手 响应报文为发出釆用地址解析协议的认证响应报文( ARP- Reponse )„
PCT/CN2003/000203 2002-03-26 2003-03-19 Procede d'etablissement d'une liaison entre le dispositif d'acces au reseau et l'utilisateur mettant en oeuvre le protocole 802.1x WO2003081839A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
BR0308387-0A BR0308387A (pt) 2002-03-26 2003-03-19 Método para implementar o estabelecimento da comunicação entre o dispositivo de acesso de rede baseado no 802.1x e o cliente
AU2003227166A AU2003227166A1 (en) 2002-03-26 2003-03-19 A method for implementing handshaking between the network accessing device and the user based on 802.1x protocol
US10/942,306 US20050080921A1 (en) 2002-03-26 2004-09-16 Method of implementing handshaking between 802.1X-based network access device and client

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN02116339.1 2002-03-26
CN 02116339 CN1214597C (zh) 2002-03-26 2002-03-26 基于802.1x协议的网络接入设备与客户端握手的实现方法

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US10/942,306 Continuation US20050080921A1 (en) 2002-03-26 2004-09-16 Method of implementing handshaking between 802.1X-based network access device and client

Publications (1)

Publication Number Publication Date
WO2003081839A1 true WO2003081839A1 (fr) 2003-10-02

Family

ID=28048655

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2003/000203 WO2003081839A1 (fr) 2002-03-26 2003-03-19 Procede d'etablissement d'une liaison entre le dispositif d'acces au reseau et l'utilisateur mettant en oeuvre le protocole 802.1x

Country Status (5)

Country Link
US (1) US20050080921A1 (zh)
CN (1) CN1214597C (zh)
AU (1) AU2003227166A1 (zh)
BR (1) BR0308387A (zh)
WO (1) WO2003081839A1 (zh)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102761869A (zh) * 2012-06-26 2012-10-31 杭州华三通信技术有限公司 一种802.1x认证方法和设备
CN101702716B (zh) * 2009-11-13 2013-06-05 中兴通讯股份有限公司 一种防止认证用户被攻击的方法及装置

Families Citing this family (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7523485B1 (en) 2003-05-21 2009-04-21 Foundry Networks, Inc. System and method for source IP anti-spoofing security
US7876772B2 (en) * 2003-08-01 2011-01-25 Foundry Networks, Llc System, method and apparatus for providing multiple access modes in a data communications network
US7774833B1 (en) 2003-09-23 2010-08-10 Foundry Networks, Inc. System and method for protecting CPU against remote access attacks
US7624431B2 (en) * 2003-12-04 2009-11-24 Cisco Technology, Inc. 802.1X authentication technique for shared media
US8528071B1 (en) 2003-12-05 2013-09-03 Foundry Networks, Llc System and method for flexible authentication in a data communications network
CN100355299C (zh) * 2004-11-16 2007-12-12 华为技术有限公司 一种接收组播广播业务的方法
US7734737B2 (en) * 2005-05-26 2010-06-08 Nokia Corporation Device management with configuration information
CN100461098C (zh) * 2006-05-11 2009-02-11 中兴通讯股份有限公司 一种认证软件自动升级方法
US8391894B2 (en) * 2006-06-26 2013-03-05 Intel Corporation Methods and apparatus for location based services in wireless networks
CN101163000B (zh) * 2006-10-13 2011-03-02 中兴通讯股份有限公司 一种二次认证方法及系统
US20080107092A1 (en) * 2006-11-08 2008-05-08 Pouya Taaghol Universal services interface for wireless broadband networks
US20080108336A1 (en) * 2006-11-08 2008-05-08 Muthaiah Venkatachalum Location-based services in wireless broadband networks
CN103200172B (zh) 2013-02-19 2018-06-26 中兴通讯股份有限公司 一种802.1x接入会话保活的方法及系统
US9825928B2 (en) * 2014-10-22 2017-11-21 Radware, Ltd. Techniques for optimizing authentication challenges for detection of malicious attacks
CN107608843B (zh) * 2017-07-31 2021-02-02 苏州浪潮智能科技有限公司 验证芯片接口互联成功的方法及其第一芯片
US10834591B2 (en) 2018-08-30 2020-11-10 At&T Intellectual Property I, L.P. System and method for policy-based extensible authentication protocol authentication
US10999379B1 (en) 2019-09-26 2021-05-04 Juniper Networks, Inc. Liveness detection for an authenticated client session

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001111544A (ja) * 1999-10-05 2001-04-20 Nec Corp 無線lanシステムにおける認証方法と認証装置
EP1104960A1 (en) * 1999-12-02 2001-06-06 Sony International (Europe) GmbH Message authentication
WO2001041470A2 (en) * 1999-12-03 2001-06-07 Qualcomm Incorporated Method and apparatus for authentication in a wireless telecommunications system

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11308509A (ja) * 1998-04-17 1999-11-05 Minolta Co Ltd デジタルカメラシステム及びこのシステムに用いられる記録媒体
US6161125A (en) * 1998-05-14 2000-12-12 Sun Microsystems, Inc. Generic schema for storing configuration information on a client computer
US6301609B1 (en) * 1999-07-07 2001-10-09 Lucent Technologies Inc. Assignable associate priorities for user-definable instant messaging buddy groups
US6597683B1 (en) * 1999-09-10 2003-07-22 Pulse-Link, Inc. Medium access control protocol for centralized wireless network communication management
KR100619005B1 (ko) * 1999-11-25 2006-08-31 삼성전자주식회사 장치간의 연결 설정을 위한 인증방법
FI20000760A0 (fi) * 2000-03-31 2000-03-31 Nokia Corp Autentikointi pakettidataverkossa
US6430395B2 (en) * 2000-04-07 2002-08-06 Commil Ltd. Wireless private branch exchange (WPBX) and communicating between mobile units and base stations
US20020091926A1 (en) * 2001-01-10 2002-07-11 The Furukawa Electric Co., Ltd. Multicast authentication method, multicast authentication server, network interconnection apparatus and multicast authentication system
US20020108058A1 (en) * 2001-02-08 2002-08-08 Sony Corporation And Sony Electronics Inc. Anti-theft system for computers and other electronic devices
US20020174335A1 (en) * 2001-03-30 2002-11-21 Junbiao Zhang IP-based AAA scheme for wireless LAN virtual operators
US7224979B2 (en) * 2001-05-03 2007-05-29 Symantec Corporation Location-aware service proxies in a short-range wireless environment
US7546629B2 (en) * 2002-03-06 2009-06-09 Check Point Software Technologies, Inc. System and methodology for security policy arbitration
JP4236398B2 (ja) * 2001-08-15 2009-03-11 富士通株式会社 通信方法、通信システム及び通信接続プログラム
US8817757B2 (en) * 2001-12-12 2014-08-26 At&T Intellectual Property Ii, L.P. Zero-configuration secure mobility networking technique with web-based authentication interface for large WLAN networks
US7194622B1 (en) * 2001-12-13 2007-03-20 Cisco Technology, Inc. Network partitioning using encryption
US6996714B1 (en) * 2001-12-14 2006-02-07 Cisco Technology, Inc. Wireless authentication protocol

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001111544A (ja) * 1999-10-05 2001-04-20 Nec Corp 無線lanシステムにおける認証方法と認証装置
EP1104960A1 (en) * 1999-12-02 2001-06-06 Sony International (Europe) GmbH Message authentication
WO2001041470A2 (en) * 1999-12-03 2001-06-07 Qualcomm Incorporated Method and apparatus for authentication in a wireless telecommunications system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702716B (zh) * 2009-11-13 2013-06-05 中兴通讯股份有限公司 一种防止认证用户被攻击的方法及装置
CN102761869A (zh) * 2012-06-26 2012-10-31 杭州华三通信技术有限公司 一种802.1x认证方法和设备

Also Published As

Publication number Publication date
CN1214597C (zh) 2005-08-10
AU2003227166A1 (en) 2003-10-08
US20050080921A1 (en) 2005-04-14
CN1447570A (zh) 2003-10-08
BR0308387A (pt) 2005-01-11

Similar Documents

Publication Publication Date Title
EP2051432B1 (en) An authentication method, system, supplicant and authenticator
WO2003081839A1 (fr) Procede d'etablissement d'une liaison entre le dispositif d'acces au reseau et l'utilisateur mettant en oeuvre le protocole 802.1x
JP3844762B2 (ja) Eponにおける認証方法及び認証装置
US7624437B1 (en) Methods and apparatus for user authentication and interactive unit authentication
US7480933B2 (en) Method and apparatus for ensuring address information of a wireless terminal device in communications network
JP2010086529A (ja) 連続する再認証を必要としないsipシグナリング
CN101127600A (zh) 一种用户接入认证的方法
WO2008034319A1 (fr) Procédé, système et dispositif d'authentification destinés à un dispositif de réseau
CN107277058B (zh) 一种基于bfd协议的接口认证方法及系统
US7788715B2 (en) Authentication for transmission control protocol
US8213364B2 (en) Method for releasing a high rate packet data session
CN102271120A (zh) 一种增强安全性的可信网络接入认证方法
JP2010062667A (ja) ネットワーク機器及びネットワークシステム
JP2010187314A (ja) 認証機能付きネットワーク中継機器及びそれを用いた端末の認証方法
CN108712398B (zh) 认证服务器的端口认证方法、服务器、交换机和存储介质
CN111416824A (zh) 一种网络接入认证控制系统
JP4768547B2 (ja) 通信装置の認証システム
Cisco Configuring Network Security
Cisco Configuring Network Security
Cisco Configuring Network Security
Cisco Configuring Network Security
Cisco Configuring Network Security
Cisco Configuring Network Security
Cisco Configuring Network Security
Cisco Configuring Network Security

Legal Events

Date Code Title Description
AK Designated states

Kind code of ref document: A1

Designated state(s): AE AG AL AM AT AU AZ BA BB BG BR BY BZ CA CH CO CR CU CZ DE DK DM DZ EC EE ES FI GB GD GE GH GM HR HU ID IL IN IS JP KE KG KP KR KZ LC LK LR LS LT LU LV MA MD MG MK MN MW MX MZ NI NO NZ OM PH PL PT RO RU SC SD SE SG SK SL TJ TM TN TR TT TZ UA UG US UZ VC VN YU ZA ZM ZW

AL Designated countries for regional patents

Kind code of ref document: A1

Designated state(s): GH GM KE LS MW MZ SD SL SZ TZ UG ZM ZW AM AZ BY KG KZ MD RU TJ TM AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HU IE IT LU MC NL PT RO SE SI SK TR BF BJ CF CG CI CM GA GN GQ GW ML MR NE SN TD TG

DFPE Request for preliminary examination filed prior to expiration of 19th month from priority date (pct application filed before 20040101)
121 Ep: the epo has been informed by wipo that ep was designated in this application
WWE Wipo information: entry into national phase

Ref document number: 10942306

Country of ref document: US

122 Ep: pct application non-entry in european phase
NENP Non-entry into the national phase

Ref country code: JP

WWW Wipo information: withdrawn in national office

Country of ref document: JP