CN102739657A - Enable authentication method and method for butt TACACS (Terminal Access Controller Access Control System) + server - Google Patents

Enable authentication method and method for butt TACACS (Terminal Access Controller Access Control System) + server Download PDF

Info

Publication number
CN102739657A
CN102739657A CN2012101992147A CN201210199214A CN102739657A CN 102739657 A CN102739657 A CN 102739657A CN 2012101992147 A CN2012101992147 A CN 2012101992147A CN 201210199214 A CN201210199214 A CN 201210199214A CN 102739657 A CN102739657 A CN 102739657A
Authority
CN
China
Prior art keywords
tacacs
enable
server
enable authentication
client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2012101992147A
Other languages
Chinese (zh)
Inventor
徐德
林华云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
ZTE Corp
Original Assignee
ZTE Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by ZTE Corp filed Critical ZTE Corp
Priority to CN2012101992147A priority Critical patent/CN102739657A/en
Publication of CN102739657A publication Critical patent/CN102739657A/en
Pending legal-status Critical Current

Links

Images

Abstract

The invention discloses an enable authentication method and an enable authentication method for a butt TACACS (Terminal Access Controller Access Control System) + a server. The method comprises the following steps that in an IP (Internet protocol) network, the TACACS+ client side sends an enable authentication request message which contains an enable authentication type to the TACACS+ server to request the TACACS+ server to authenticate; after receiving the enable authentication request message, the TACACS+ server extracts the enable authentication type from the enable authentication request message, generates an enable authentication response message responding to the enable authentication request message according to the enable authentication type, and sends the enable authentication response message to the TACACS+ client side; the TACACS+ client side judges whether the enable authentication on the butt TACACS+ server is successful or not according to the enable authentication response message; and when the authentication is not successful, the TACACS+ client side modifies the enable authentication type in the enable authentication request message, and the steps are repeated until the enable authentication on the butt TACACS+ server is successful.

Description

A kind of enable authentication method and system of docking the TACACS+ server
Technical field
The present invention relates to the communications field, particularly a kind of treatment technology of TACACS+enable authentication different authentication type.
Background technology
TACACS+ (Terminal Access Controller Access Control System) is a terminal access controller access control system, is the network application agreement of a kind of AAA (Authentication, Authorization, Accounting) type.TACACS+ supports independently authentication function, allows different TACACS+ security servers respectively as authentication, authorization and accounting server, is used for functions such as authentication.
This agreement has realized the Long-distance Control for user's access.The enable authentication is that the user adopts the TACACS+ server authentication when carrying out the enable authentication.The TACACS+draft regulation, for the enable authentication, the authen_type of its message (auth type) does not use (not used).
The TACACS+ server is many at present, and different TACACS+ servers is handled also different to the auth type field of enable authentication request packet, and all adopt the different TACACS+ server of enable authentication butt joint can dock unsuccessful.Because TACACS+draft does not clearly stipulate the enable auth type occurrence of enable authentication request packet, therefore, how to guarantee that the different TACACS+ server of enable authentication success butt joint becomes problem demanding prompt solution.
Summary of the invention
The object of the present invention is to provide a kind of enable authentication method and system of the TACACS+ of butt joint server, can solve the problem that different TACACS+ server failures are docked in the enable authentication better.
According to an aspect of the present invention, a kind of enable authentication method of the TACACS+ of butt joint server is provided, has comprised:
In IP network, the TACACS+ client is sent the enable authentication request packet that comprises the enable auth type to the TACACS+ server, and request TACACS+ server carries out authentication;
After the TACACS+ server is received said enable authentication request packet; Extract enable auth type wherein; And according to said enable auth type, generation is used to respond the enable authentication response message of said enable authentication request packet and is sent to said TACACS+ client;
The TACACS+ client judges according to said enable authentication response message whether enable authentication butt joint TACACS+ server is successful;
When judged result is when success, the TACACS+ client is revised the enable auth type in the enable authentication request packet, and repeats above step, until the success of enable authentication butt joint TACACS+ server.
Preferably, said TACACS+ client is carried out Timing Processing after sending the enable authentication request packet, wait for that said TACACS+ server responds said enable authentication request packet in the given time.
Preferably, in the scheduled time after said TACACS+ client is being sent the enable authentication request packet, when not receiving the enable authentication response message of said TACACS+ server response, confirm the not success of enable authentication butt joint TACACS+ server.
Preferably; In the scheduled time after said TACACS+ client is being sent the enable authentication request packet; When receiving the enable authentication response message of said TACACS+ server response; Resolve said enable authentication response message, and utilize analysis result to confirm whether enable authentication butt joint TACACS+ server is successful.
Preferably, said enable auth type comprises none, ascii, pap, chap, arap, mschap.
According to a further aspect in the invention, a kind of enable Verification System of the TACACS+ of butt joint server is provided, has comprised the TACACS+ client and the TACACS+ server that operate on the IP network, it is characterized in that,
Said TACACS+ client; Be used for sending the enable authentication request packet that comprises the enable auth type to the TACACS+ server; Request TACACS+ server carries out the enable authentication, and according to the enable authentication response message of receiving, judges whether enable authentication butt joint TACACS+ server is successful; When judged result is when success; Revise the enable auth type in the enable authentication request packet, and repeat the enable authentication, until the success of enable authentication butt joint TACACS+ server;
Said TACACS+ server; Be used for after receiving said enable authentication request packet; Extract enable auth type wherein; And according to said enable auth type, generation is used to respond the enable authentication response message of said enable authentication request packet and is sent to said TACACS+ client.
Preferably, said TACACS+ client comprises:
Client packet sending and receiving unit is used to send the enable authentication request packet that comprises the enable auth type, and receives the said enable authentication response message of said TACACS+ server response;
The client timing unit is used for after said packet sending and receiving unit sends said enable authentication request packet, carrying out Timing Processing, waits for that said TACACS+ server responds said enable authentication request packet in the given time;
The client resolution unit is used to resolve the said enable authentication response message of receiving;
The client certificate judging unit is used for according to said enable authentication response message, confirms whether enable authentication butt joint TACACS+ server is successful.
Preferably; In the scheduled time after said client packet sending and receiving unit is sending the enable authentication request packet; When not receiving the enable authentication response message of said TACACS+ server response, said client certificate judging unit is confirmed the not success of enable authentication butt joint TACACS+ server.
Preferably; In the scheduled time after said client packet sending and receiving unit is sending the enable authentication request packet; When receiving the enable authentication response message of said TACACS+ server response; Said client certificate judging unit utilizes said client resolution unit to resolve the analysis result of said enable authentication response message, confirms whether enable authentication butt joint TACACS+ server is successful.
Preferably, said TACACS+ server comprises:
Server packet sending and receiving unit; Be used to receive said enable authentication request packet, and send the enable authentication response message that is used to respond said enable authentication request packet to said TACACS+ client from comprising of TACACS+ client of said enable auth type;
The server parses unit is used to resolve the said enable authentication request packet that said server packet sending and receiving unit is received, extracts enable auth type wherein;
The server authentication unit is used for according to said enable auth type, generates said enable authentication response message.
Compared with prior art, beneficial effect of the present invention is:
When the present invention adopts enable authentication butt joint TACACS+ server failure; Can attempt revising the field of the enable auth type of enable authentication request packet; And dock the TACACS+ server again; Be revised as the enable auth type that corresponding TACACS+ server is supported up to this field, realized that the enable authentication success docks different TACACS+ servers.
Description of drawings
Fig. 1 is the enable authentication method block diagram of the butt joint TACACS+ server that provides of the embodiment of the invention;
Fig. 2 is the enable Verification System network topological diagram of the butt joint TACACS+ server that provides of the embodiment of the invention;
Fig. 3 is the particular flow sheet of the enable authentication different authentication type of process that provides of the embodiment of the invention.
Embodiment
, should be appreciated that following illustrated preferred embodiment only is used for explanation and explains the present invention, and be not used in qualification the present invention a preferred embodiment of the present invention will be described in detail below in conjunction with accompanying drawing.
Fig. 1 is the enable authentication method block diagram of the butt joint TACACS+ server that provides of the embodiment of the invention, and is as shown in Figure 1, comprising:
Step S101, in IP network, the TACACS+ client is sent the enable authentication request packet comprise the enable auth type to the TACACS+ server, request TACACS+ server carries out authentication.
Further, said TACACS+ client is carried out Timing Processing after sending the enable authentication request packet, wait for that said TACACS+ server responds said enable authentication request packet in the given time.
After step S102, TACACS+ server are received said enable authentication request packet; Extract enable auth type wherein; And according to said enable auth type, generation is used to respond the enable authentication response message of said enable authentication request packet and is sent to said TACACS+ client.
Step S103, TACACS+ client judge according to said enable authentication response message whether enable authentication butt joint TACACS+ server is successful.
Step S104, when judged result is when success, the TACACS+ client is revised the enable auth type in the enable authentication request packet, and repeats above step, until the success of enable authentication butt joint TACACS+ server.
Further, in the scheduled time after said TACACS+ client is being sent the enable authentication request packet, when not receiving the enable authentication response message of said TACACS+ server response, confirm the not success of enable authentication butt joint TACACS+ server.
Further; In the scheduled time after said TACACS+ client is being sent the enable authentication request packet; When receiving the enable authentication response message of said TACACS+ server response; Resolve said enable authentication response message, and utilize analysis result to confirm whether enable authentication butt joint TACACS+ server is successful.
Above-mentioned enable auth type comprises none, ascii, pap, chap, arap, mschap.
When adopting enable authentication butt joint TACACS+ server; The enable auth type adopts the default value of using earlier; If butt joint TACACS+ server failure; Then attempt revising the corresponding field value (none, ascii, pap, chap, arap, mschap) of enable auth type except that default value, the new enable of the initiation authentication of laying equal stress on is up to successfully docking the TACACS+ server.
Fig. 2 is the enable Verification System network topological diagram of the butt joint TACACS+ server that provides of the embodiment of the invention, and is as shown in Figure 2, comprises the TACACS+ client and the TACACS+ server that operate on the IP network.When the user carried out the enable authentication, the TACACS+ client was sent the enable authentication request packet to the TACACS+ server, and waits for that said TACACS+ server responds said enable authentication request packet.Wherein:
Said TACACS+ client; Be used for sending the enable authentication request packet that comprises the enable auth type to the TACACS+ server; Request TACACS+ server carries out the enable authentication, and according to the enable authentication response message of receiving, judges whether enable authentication butt joint TACACS+ server is successful; When judged result is when success; Revise the enable auth type in the enable authentication request packet, and repeat the enable authentication, until the success of enable authentication butt joint TACACS+ server.
Particularly, said TACACS+ client comprises:
Client packet sending and receiving unit is used to send the enable authentication request packet that comprises the enable auth type, and receives the said enable authentication response message of said TACACS+ server response;
The client timing unit is used for after said packet sending and receiving unit sends said enable authentication request packet, carrying out Timing Processing, waits for that said TACACS+ server responds said enable authentication request packet in the given time;
The client resolution unit is used to resolve the said enable authentication response message of receiving;
The client certificate judging unit is used for according to said enable authentication response message, confirms whether enable authentication butt joint TACACS+ server is successful.In the i.e. scheduled time after said client packet sending and receiving unit is sending the enable authentication request packet; When not receiving the enable authentication response message of said TACACS+ server response, said client certificate judging unit is confirmed the not success of enable authentication butt joint TACACS+ server.In the scheduled time after said client packet sending and receiving unit is sending the enable authentication request packet; When receiving the enable authentication response message of said TACACS+ server response; Said client certificate judging unit utilizes said client resolution unit to resolve the analysis result of said enable authentication response message, confirms whether enable authentication butt joint TACACS+ server is successful.
Said TACACS+ server; Be used for after receiving said enable authentication request packet; Extract enable auth type wherein; And according to the enable auth type, generation is used to respond the enable authentication response message of said enable authentication request packet and is sent to said TACACS+ client.
Particularly, said TACACS+ server comprises:
Server packet sending and receiving unit; Be used to receive said enable authentication request packet, and send the enable authentication response message that is used to respond said enable authentication request packet to said TACACS+ client from comprising of TACACS+ client of said enable auth type;
The server parses unit is used to resolve the said enable authentication request packet that said server packet sending and receiving unit is received, extracts enable auth type wherein;
The server authentication unit is used for according to said enable auth type, generates said enable authentication response message.
The workflow of the enable Verification System of said butt joint TACACS+ server specifies as follows:
1, at first adopt the authentication of TACACS+enable mode, the TACACS+ client is initiated authentication request through sending the enable authentication request packet to the TACACS+ server, writes down the default value of the enable auth type in the said enable authentication request packet.
2, the TACACS+ server judges whether the numerical value that the corresponding field of enable authentication request packet is filled in meets TACACS+ draft (The TACACS+ Protocol Version 1.78) regulation, thereby judgement enable authentication success is still failed.Draft specifies enable authentication request packet is filled in following field:
action=TAC_PLUS_AUTHEN_LOGIN
priv_lvl=implementation?dependent
authen_type=not?used
service=TAC_PLUS_AUTHEN_SVC_ENABLE
Because TACACS+ is a draft, does not form RFC, different TACACS+ servers are not quite similar to the fill request of authen_type field.
When the numerical value of filling in when the corresponding authen_type field of enable authentication request packet meets the fill request of TACACS+ server; The TACACS+ server sends to the TACACS+ client and is used to represent to dock successful enable authentication response message, otherwise is used to represent to dock the enable authentication response message of failure to the transmission of TACACS+ client.
3, the TACACS+ client receives said enable authentication response message and resolves, when judging the success of enable authentication butt joint TACACS+ server, and process ends.For example; The status value of the said enable authentication response message that the TACACS+ client is received is not TAC_PLUS_AUTHEN_STATUS_ERROR (0x07); Then enable authentication butt joint TACACS+ server success, promptly said TACACS+ client uses the TACACS+ server end to carry out the enable authentication success.
When 4, the TACACS+ client confirms that enable authentication butt joint TACACS+ server is unsuccessful; Revising the enable auth type is next enable auth type; And be not the default value used and all enable auth types when not attempting not finishing at the enable auth type of judging current enable authentication request packet, continue to initiate authentication request until the success of enable authentication butt joint TACACS+ server to the TACACS+ server.
The situation that the situation of said butt joint failure, promptly said TACACS+ client use the TACACS+ server to carry out enable authentication butt joint TACACS+ server failure comprises:
(1) the TACACS+ client receives that the status value of the enable authentication response message that the TACACS+ server returns is TAC_PLUS_AUTHEN_STATUS_ERROR (0x07).
(2) the TACACS+ client is connected under the normal condition with network, can not receive the said enable authentication response message of TACACS+ server response in the scheduled time after sending the enable authentication request packet.
Fig. 3 is the idiographic flow that the embodiment of the invention provides enable authentication different authentication type of process, and is as shown in Figure 3, comprising:
Step S301, at first adopt the TACACS+enable authentication mode, auth type adopts the default value of using (such as none), notes this default value.
Step S302, TACACS+ client are initiated authentication through send the enable authentication request packet that comprises the enable auth type to the TACACS+ server.
If step S303 TACACS+ client is confirmed the success of enable authentication butt joint TACACS+ server, process ends then, otherwise, execution in step S304.
If step S304 TACACS+ client is confirmed enable authentication butt joint TACACS+ server failure, then this enable auth type is revised as down a kind of enable auth type.
Step S305, TACACS+ client judge whether the enable auth type of said enable authentication request packet is the default value of using; If default value, execution in step S304 then remodifies the enable auth type of enable authentication request packet; Otherwise, execution in step S306.
Step S306, TACACS+ client judge whether all enable auth types of enable authentication request packet were all attempted, if, process ends then, otherwise execution in step S302.
In sum, the present invention has following technique effect:
The present invention has overcome the defective that the enable auth type of enable authentication request packet can not be revised, and has realized revising through self adaptation the enable auth type of enable authentication request packet, the function of successfully docking different TACACS+ servers.
Although preceding text specify the present invention, the invention is not restricted to this, those skilled in the art of the present technique can carry out various modifications according to principle of the present invention.Therefore, all modifications of doing according to the principle of the invention all are to be understood that to falling into protection scope of the present invention.

Claims (10)

  1. One kind dock terminal access controller access control system TACACS+ server enable the enable authentication method, it is characterized in that, comprising:
    In IP network, the TACACS+ client is sent the enable authentication request packet that comprises the enable auth type to the TACACS+ server, and request TACACS+ server carries out authentication;
    After the TACACS+ server is received said enable authentication request packet; Extract enable auth type wherein; And according to said enable auth type, generation is used to respond the enable authentication response message of said enable authentication request packet and is sent to the TACACS+ client;
    The TACACS+ client judges according to said enable authentication response message whether enable authentication butt joint TACACS+ server is successful;
    When judged result is when success, the TACACS+ client is revised the enable auth type in the enable authentication request packet, and repeats above step, until the success of enable authentication butt joint TACACS+ server.
  2. 2. method according to claim 1 is characterized in that, said TACACS+ client is carried out Timing Processing after sending the enable authentication request packet, wait for that said TACACS+ server responds said enable authentication request packet in the given time.
  3. 3. method according to claim 2; It is characterized in that; In the scheduled time after said TACACS+ client is being sent the enable authentication request packet; When not receiving the enable authentication response message of said TACACS+ server response, confirm the not success of enable authentication butt joint TACACS+ server.
  4. 4. method according to claim 2; It is characterized in that; In the scheduled time after said TACACS+ client is being sent the enable authentication request packet; When receiving the enable authentication response message of said TACACS+ server response, resolve said enable authentication response message, and utilize analysis result to confirm whether enable authentication butt joint TACACS+ server is successful.
  5. 5. according to any described method of claim 1-4, it is characterized in that said enable auth type comprises none, ascii, pap, chap, arap, mschap.
  6. One kind dock terminal access controller access control system TACACS+ server enable the enable Verification System, comprise the TACACS+ client and the TACACS+ server that operate on the IP network, it is characterized in that,
    Said TACACS+ client is used for sending the enable authentication request packet that comprises the enable auth type to the TACACS+ server, and request TACACS+ server carries out authentication; And according to the enable authentication response message of receiving; Judge the whether success of enable authentication butt joint TACACS+ server, when judged result during for success, the enable auth type in the modification enable authentication request packet; And repeat the enable authentication, until the success of enable authentication butt joint TACACS+ server;
    Said TACACS+ server; Be used for after receiving said enable authentication request packet; Extract enable auth type wherein; And according to said enable auth type, generation is used to respond the enable authentication response message of said enable authentication request packet and is sent to said TACACS+ client.
  7. 7. system according to claim 6 is characterized in that, said TACACS+ client comprises:
    Client packet sending and receiving unit is used to send the enable authentication request packet that comprises the enable auth type, and receives the said enable authentication response message of said TACACS+ server response;
    The client timing unit is used for after said packet sending and receiving unit sends said enable authentication request packet, carrying out Timing Processing, waits for that said TACACS+ server responds said enable authentication request packet in the given time;
    The client resolution unit is used to resolve the said enable authentication response message of receiving;
    The client certificate judging unit is used for according to said enable authentication response message, confirms whether enable authentication butt joint TACACS+ server is successful.
  8. 8. system according to claim 7; It is characterized in that; In the scheduled time after said client packet sending and receiving unit is sending the enable authentication request packet; When not receiving the enable authentication response message of said TACACS+ server response, said client certificate judging unit is confirmed the not success of enable authentication butt joint TACACS+ server.
  9. 9. system according to claim 7; It is characterized in that; In the scheduled time after said client packet sending and receiving unit is sending the enable authentication request packet; When receiving the enable authentication response message of said TACACS+ server response, said client certificate judging unit utilizes said client resolution unit to resolve the analysis result of said enable authentication response message, confirms whether enable authentication butt joint TACACS+ server is successful.
  10. 10. according to Claim 8 or 9 described systems, it is characterized in that said TACACS+ server comprises:
    Server packet sending and receiving unit; Be used to receive said enable authentication request packet, and send the enable authentication response message that is used to respond said enable authentication request packet to said TACACS+ client from comprising of TACACS+ client of said enable auth type;
    The server parses unit is used to resolve the said enable authentication request packet that said server packet sending and receiving unit is received, extracts enable auth type wherein;
    The server authentication unit is used for according to said enable auth type, generates said enable authentication response message.
CN2012101992147A 2012-06-15 2012-06-15 Enable authentication method and method for butt TACACS (Terminal Access Controller Access Control System) + server Pending CN102739657A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2012101992147A CN102739657A (en) 2012-06-15 2012-06-15 Enable authentication method and method for butt TACACS (Terminal Access Controller Access Control System) + server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2012101992147A CN102739657A (en) 2012-06-15 2012-06-15 Enable authentication method and method for butt TACACS (Terminal Access Controller Access Control System) + server

Publications (1)

Publication Number Publication Date
CN102739657A true CN102739657A (en) 2012-10-17

Family

ID=46994441

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2012101992147A Pending CN102739657A (en) 2012-06-15 2012-06-15 Enable authentication method and method for butt TACACS (Terminal Access Controller Access Control System) + server

Country Status (1)

Country Link
CN (1) CN102739657A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017076363A1 (en) * 2015-11-06 2017-05-11 Mediatek Inc. Method for efficient reliable transmission

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6466964B1 (en) * 1999-06-15 2002-10-15 Cisco Technology, Inc. Methods and apparatus for providing mobility of a node that does not support mobility
CN1753359A (en) * 2004-09-24 2006-03-29 华为技术有限公司 Method of implementing transmission syncML synchronous data
CN1859415A (en) * 2006-04-04 2006-11-08 华为技术有限公司 Method and device for forced verifying from end-to-end protocol
CN101083528A (en) * 2007-06-08 2007-12-05 中兴通讯股份有限公司南京分公司 Dynamic host configuring protocol based security access method and system
CN101742497A (en) * 2009-12-24 2010-06-16 中兴通讯股份有限公司 Method for realizing access authentication and client

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6466964B1 (en) * 1999-06-15 2002-10-15 Cisco Technology, Inc. Methods and apparatus for providing mobility of a node that does not support mobility
CN1753359A (en) * 2004-09-24 2006-03-29 华为技术有限公司 Method of implementing transmission syncML synchronous data
CN1859415A (en) * 2006-04-04 2006-11-08 华为技术有限公司 Method and device for forced verifying from end-to-end protocol
CN101083528A (en) * 2007-06-08 2007-12-05 中兴通讯股份有限公司南京分公司 Dynamic host configuring protocol based security access method and system
CN101742497A (en) * 2009-12-24 2010-06-16 中兴通讯股份有限公司 Method for realizing access authentication and client

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
D. CARREL ET AL.: "《The TACACS+ Protocol Version 1.78》", 《IETF》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2017076363A1 (en) * 2015-11-06 2017-05-11 Mediatek Inc. Method for efficient reliable transmission
US10142253B2 (en) 2015-11-06 2018-11-27 Hfi Innovation Inc. Method for efficient reliable transmission

Similar Documents

Publication Publication Date Title
EP3068093B1 (en) Security authentication method and bidirectional forwarding detection method
CN102638468B (en) The method of protection information transmission security, transmitting terminal, receiving terminal and system
WO2016192282A1 (en) Link detection method and device
CN105407008A (en) Reconnecting method and system for interrupted TCP (Transmission Control Protocol) connection, terminal and server
CN103825881A (en) Method and apparatus for realizing redirection of WLAN user based on wireless access controller (AC)
CN103825777A (en) DMZ server switching method and device
CN103685398B (en) Communication connection method for building up and communication system
CN104821940A (en) Method and equipment for sending portal redirected address
CN103199990B (en) A kind of method and apparatus of Routing Protocol certification migration
CN111404918A (en) Cloud mobile phone distributed service emergency authentication method, device and system
CN104009961A (en) PPPoE session ID distribution method and equipment thereof
CN102739657A (en) Enable authentication method and method for butt TACACS (Terminal Access Controller Access Control System) + server
CN106331074B (en) A kind of certification switching method
CN104735050A (en) Authentication method integrating mac authentication and web authentication
CN102195943B (en) Safety information interaction method and system
EP3313039A1 (en) Home gateway, communication management method and communication system thereof
CN106330971A (en) Authentication method, server and system based on stateless service
US20130227157A1 (en) Terminal apparatus, operation method of terminal apparatus, and program product
CN101316165B (en) Method and server for implementing communication between application system and communication network
JP3990412B2 (en) Wireless LAN authentication system compatible with WakeOnLAN
CN108270613B (en) Message sending method and network equipment
CN106332078B (en) dot1x user authentication system, method and device
US20120222088A1 (en) Method and Apparatus for Implementing Communication of Stand-Alone Software
CN105045759B (en) Control communication method of financial self-service equipment
CN102065072B (en) Method and device for fast establishing PPPOE (Point-to-Point Protocol over Ethernet) link layer connection

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20121017