METHOD FOR REALIZING NETWORK ACCESS AUTHENTICATION
First Claim
1. A method for realizing network access authentication, wherein a network access authentication device pre-storing a system integrity value of a device waiting to access which is calculated by the device waiting to access itself, and a correspondence between each device waiting to access and its system integrity value, the method comprises the following steps:
- a). the device waiting to access acquires its current system integrity value, and sends an authentication request including information containing the current system integrity value to the network access authentication device;
b). the network access authentication device judges whether the current system integrity value of the device waiting to access in the received authentication request and its stored system integrity value of the device waiting to access are identical or not, according to the received authentication request and the correspondence; and
, in a case where the received current system integrity value of the device waiting to access in the received authentication request and its stored system integrity value of the device waiting to access are identical, the network access authentication device determines that the network access is authenticated.
2 Assignments
0 Petitions
Accused Products
Abstract
A method for realizing network access authentication, wherein a network access authentication device pre-storing a system integrity value of a device waiting to access and a correspondence between each device waiting to access and its system integrity value. When the device waiting to access needs to access the network, it acquires its current system integrity value, and sends the current system integrity value to the network access authentication device; the network access authentication device judges whether the received current system integrity value of the device waiting to access and its stored integrity value of the device waiting to access are identical or not, and in a case where the received current system integrity value of the device waiting to access and its stored integrity value of the device waiting to access are identical, it determines that the network access is authenticated. As such, the network access device could determine the real status of the device waiting to access, and ensure the device accessing to the network is really secure, thereby ensuring the security of the network.
52 Citations
16 Claims
-
1. A method for realizing network access authentication, wherein a network access authentication device pre-storing a system integrity value of a device waiting to access which is calculated by the device waiting to access itself, and a correspondence between each device waiting to access and its system integrity value, the method comprises the following steps:
-
a). the device waiting to access acquires its current system integrity value, and sends an authentication request including information containing the current system integrity value to the network access authentication device; b). the network access authentication device judges whether the current system integrity value of the device waiting to access in the received authentication request and its stored system integrity value of the device waiting to access are identical or not, according to the received authentication request and the correspondence; and
, in a case where the received current system integrity value of the device waiting to access in the received authentication request and its stored system integrity value of the device waiting to access are identical, the network access authentication device determines that the network access is authenticated. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
Specification