USOO8495712B2 (12) United States Patent (10) Patent N0.: Lai et al. (54) (45) Date of Patent: PEER-TO-PEER ACCESS CONTROL METHOD OF TRIPLE UNIT STRUCTURE (75) Inventors: Xiaolong Lai, Shaanxi (CN); Jun Cao, Shaanxi (CN); Manxia Tie, Shaanxi 1399490 A 1426200 A 1539106 1567868 OTHER PUBLICATIONS Hubert Zimmerman, OSI Reference ModeliThe ISO Model of Architecture for Open System Interconnection. 1980* U.S.C. 154(b) by 454 days. (21) (22) (86) Appl. No .: 12/519,955 PCT Filed: Jun. 25, 2007 2/2003 6/2003 10/2004 1/2005 (Continued) (73) Assignee: China IWNCOMM Co., Ltd. (CN) Subject to any disclaimer, the term of this patent is extended or adjusted under 35 Jul. 23, 2013 FOREIGN PATENT DOCUMENTS CN CN CN CN (CN); Bianling Zhang, Shaanxi (CN) ( * ) Notice: US 8,495,712 B2 (Continued) Primary Examiner * KambiZ Zand Assistant Examiner * Ghodrat Jamshidi PCT No.: PCT/CN2007/070171 § 371 (0)0), (2), (4) Date: Jun. 18, 2009 (74) Attorney, Agent, or Firm * Cantor Colburn LLP (57) ABSTRACT This invention relates to a peer-to-peer access control method (87) PCT Pub. No.: WO2008/074233 of a triple-unit structure for safely implementing bidirectional PCT Pub. Date: Jun. 26, 2008 authentication between the terminal and the network. Accord ing to the method, on the basis of the access control method of (65) the existing double-unit triple-entity structure, the authenti Prior Publication Data US 2010/0037302 A1 cator function is implemented in the access controller, and the authentication protocol function is implemented in the termi Feb. 11,2010 nal and the access controller, so that the terminal, the access (30) Foreign Application Priority Data Dec. 18, 2006 (51) (52) Int. Cl. H04L 29/00 US. Cl. (2006.01) and the extension of the number of the access controllers is Field of Classi?cation Search inconvenient, but also solves the technical problems of the existing access control method of the double-unit triple-entity USPC structure that the process for establishing the trust relation USPC (58) (CN) ........................ .. 2006 1 0105203 controller and the server all participate in the authentication, and the trust relationship is established between the terminal and the access controller directly, which renders security very reliable. The invention not only solves the technical problems of the access control method of the existing double-unit double-entity structure that the access ?exibility is limited ............................................. .. 726/5; 713/155 ............................................. .. 726/5; 713/155 See application ?le for complete search history. ship is complicated and the security of the network may be in?uenced, thus achieving advantages of high security per (56) References Cited formance, no requirement of changing existing network structures and relative independency of the authentication U.S. PATENT DOCUMENTS 7,917,758 B2* 2004/0098612 A1 3/2011 protocol. Palekar et a1. .............. .. 713/171 10 Claims, 3 Drawing Sheets 5/2004 Lee et al. Terminal ‘ Access controller 401 Request 402 Response 403 Request 404 Response A 405 Request 406 Response ‘ 407 Success/failure 4. _ _ _ _ _ _ _ _ _ _ Server US 8,495,712 B2 Page 2 FOREIGN PATENT DOCUMENTS CN 1708018 A tions on communications,vol. comi28,No. 4 Apr. 1980 pp. 425 12/2005 432* Aboba, B., et al., “Extensible Authentication Protocol (EAP)”, Net work Working Group, The Internet Society, 2004. International Search Report PCT/CN2007/07017l; Dated Sep. 27, CN EP WO 1765082 1708447 2004015958 A2 4/2006 10/2006 2/2004 WO 2004077742 Al 9/2004 2007‘ OTHER PUBLICATIONS Hubert Zimerman,OSI Refecence ModeliThe ISO model of Architecture for Open Systems Interconnection IEE Transac- * Cited by examiner US. Patent Jul. 23, 2013 Sheet 1 013 Fig.1 Terminal Access controller Analglfgéifgie? Peer layer Autlhentication method layer iAuthenticator layer Encapsulationt layer 'l : Encapsulation layer 1 Bottom layersL Bottom layer US 8,495,712 B2 US. Patent Jul. 23, 2013 Sheet 2 of3 Terminal Access controller US 8,495,712 B2 Server Authentication Authentication method laverl method layer Peer layer 5 Authenticator'layer' 1| Almigy‘gfamr Encapsulation Encapsulation layer I Encapsulation layer : : Bottom layeiz‘ I ' Bottoin layer 1 Transmission layer ; : Laver Fig.3 Terminal ‘ Access controller 401 Request 402 Response ‘ V 403 Request 404 Response ‘ 405 Request 406 Response 407 Success/failure 4. _ _ - - _ _ _ _ _ _ Fig.4 layer Transmission Server US. Patent Jul. 23, 2013 Sheet 3 0f3 US 8,495,712 B2 Terminal (corresponding Access controller (corresponding to Server (corresponding to to subject) authenticator) authentication server) Authentication Authentication metnnd layer Authentication method layer: :- """""""" ' ' 1 method layer Peer layer I Encapsulation iAuthenticator layer 1 I Encapsulation layer I Peer layer Encapsulation layer ; ' i Bottom layer ; ' 1 Transmission Boittom layer layer Transmission layer : : Layer Fig .5 ASU E AE ASE 601 Authentication activation packet 602 Access authentication requeSt paCket n 603 Certi?cate authentication request packet m V _ _ 605 Access authentication response packet 604 Certi?cate authentication response packet 4 A Fig.6 US 8,495,712 B2 1 2 PEER-TO-PEER ACCESS CONTROL METHOD OF TRIPLE UNIT STRUCTURE cation. In this network structure, the terminal and the access controller both have authentication functions, thus supporting bidirectional authentication. This application claims the priority of Chinese Patent Application No. 2006101052032, ?led on Dec. 18, 2006 with the Chinese Patent Of?ce and titled “Peer-to-Peer Access Control Method of Triple-unit Structure”, the con tents of which are incorporated herein by reference in their However, there is no authentication server in the double unit double-entity structure, which leads to signi?cantly lim ited ?exibility. In addition, there are typically a large number of terminals, and if there is also a large number of access controllers, the relationship between the terminals and the access controllers may be many-to-many, and the manage ment may be very di?icult. Therefore, the structure of this type is typically used in the case that there is a limited number of access controllers, and the implementation is very limited. The network structure of the second type is the double-unit triple-entity structure as shown in FIG. 3, which includes a entirety. FIELD OF THE INVENTION The present invention relates to a network access control method, and particularly to a peer-to-peer access control method of a triple-unit structure. terminal, an access controller and a server, respectively cor responding to the ?rst entity, the second entity and the third entity. Speci?cally, the terminal, corresponding to the ?rst BACKGROUND OF THE INVENTION The basic function of a network is to provide various types of terminals with network services. Although a terminal may be physically connected to a network, the terminal connected to the network is not always an authorized legal terminal, and the network connected by the terminal is not always its required network. Thus, before the terminal communicates with the network, the terminal and the network need authen tication and authorization functions to mutually authenticate the legality of the peer party therebetween, i.e. bidirectional access control between the terminal and the network is required, so as to ensure the security of the communication. FIG. 1 is a diagram illustrating bidirectional access control between a terminal and a network. A terminal 1 accesses a network 4 via an access controller 3, and before the terminal 1 begins to use the resources of the network 4, it is required to complete access control 2 between the terminal 1 and the access controller 3, i.e.: 1. The access controller checks whether the terminal 1 has 20 25 authentication function, thus the structure of this type sup ports bidirectional authentication by using the second entity 30 35 40 45 50 a unit if it does not have the authentication function. Based on the different number of entities which participate in the authentication, there are two types of network structure the trust relationship B. Hence, it is required to relay the trust relationships three times to complete the establishment of the trust relationship between the terminal and the access con troller. However, to relay the trust relationships multiple for implementing the bi-directional authentication between 55 times may not only lead to complicated authentication but also in?uence the security of the network, thus should be avoided. SUMMARY OF THE INVENTION The present invention provides a peer-to-peer access con terminal and an access controller, where the terminal corre sponds to the ?rst entity and the access controller corresponds order to avoid this problem, a trust relationship C and a safe channel have to be established between the access controller and the server. Upon reception of the key by the access con troller, the terminal and the access controller have to con?rm a functional body which may have an authentication function in the network access authentication. In the network, the the terminal and the network. RFC3748 Extensible Authen tication Protocol (EAP) contains description as follows: The network structure of the ?rst type is the double-unit double-entity structure as shown in FIG. 2, which includes a establish a trust relationship B between the terminal and the access controller, thus a transfer of the trust relationships, i.e. to transfer from the trust relationship A to the trust relation ship B, must be carried out safely. The transfer of the trust relationships is completed by sending a key from the server to the access controller. However, if the key leaks, the security of the network may be signi?cantly in?uenced. Therefore, in cates the network 4. entity is a unit if it has the authentication function; and it is not troller is virtual. The authentication is only carried out between the terminal and the server, and the relationship with multiple terminals being corresponding to multiple access controllers is evolved into a relationship with multiple termi is established between them. But ?nally, it is required to a legal device to avoid data being intercepted, i.e. authenti In the authentication, it is required to use the concepts of entity and unit. Speci?cally, an entity refers to a functional body which may accomplish a particular function in the net work structure and can exist independently, and is typically implemented using an independent device; and a unit refers to as an intermediate of the third entity. In the double-unit triple-entity structure, the access con nals being corresponding to a server, i.e. a trust relationship A the right of accessing the network 4, i.e. authenticates the terminal 1; and 2. The terminal 1 checks whether the access controller 3 is unit, has an authentication credential, an authentication func tion, and a function for controlling whether to access the network; the access controller has a function for controlling the access of the terminal according to the result of the authentication, and has no authentication function; and the server, corresponding to the second unit, has an authentica tion credential and an authentication function. The double unit triple-entity structure is also called a Pass-through mode. In this network structure, the terminal and the server both have authentication functions, but the access controller has no 60 trol method of a triple-unit structure for safely implementing to the second entity. Speci?cally, the terminal, corresponding bidirectional authentication between the terminal and the net to the ?rst unit, has an authentication credential, an authenti cation function, and a function for controlling whether to access the network; and the access controller, corresponding to the second unit, has an authentication credential, an work, which not only solves the technical problems of the authentication function, and a function for controlling the access of the terminal according to the result of the authenti 65 access control method of the existing double-unit double entity structure that the access ?exibility is limited and the extension of the number of the access controllers is inconve nient, but also solves the technical problems of the existing access control method of the double-unit triple-entity struc US 8,495,712 B2 3 4 ture that the process for establishing the trust relationship is complicated and the security of the network may be in?u enced. A technical solution of the present invention may include: the request message and terminating the message interaction, and notifying, by the authentication method layer of the authenticator, the bottom layer of the authenticator that the subject is permitted to access the authenticator; or sending, by A peer-to-peer access control method of a triple-unit struc the authentication method layer of the authenticator, a suc cess message to the authentication method layer of the sub ture, Which includes: ing, in an authenticator, an authenticator function; and imple ject, and notifying, by the authentication method layer of the subject, the bottom layer of the subject that the subject is menting, in an authentication server, an authentication server permitted to access the authenticator. function: The request message sent by the authentication method layer of the authenticator to the authentication method layer of the subject contains a type ?eld, Which type ?eld is a ?eld used for indicating a type of the request message; and the response message sent by the authentication method layer of the subject to the authentication method layer of the authen ticator contains a type ?eld, Which type ?eld corresponds to the type ?eld contained in the request message. The above method may further includes the folloWing step: maintaining, as required, the interaction of sending the request message by the authentication method layer of the authenticator and responding to the request message by the authentication method layer of the subject. implementing, in a subject, a subject function; implement setting, in the subject, an authentication method layer of the subject, a peer layer of the subject, an encapsulation layer of the subject and a bottom layer of the subject; setting, in the authenticator, an authentication method layer of the authen ticator, an authenticator layer of the authenticator, an encap sulation layer of the authenticator, a bottom layer of the authenticator and a transmission layer of the authenticator; and setting, in the authentication server, an authentication method layer of the authentication server, a peer layer of the authentication server, an encapsulation layer of the authenti cation server and a transmission layer of the authentication 20 server; and implementing, in the authentication method layer of the The subject may be a terminal; the authenticator may be an subject, a function for carrying out, according to an authen access controller; and the authentication server may be a tication credential, authentication, and implementing, in the bottom layer of the subject, a function for transmitting data and for controlling, according to a result of the authentication, Whether the subject accesses the authenticator; implement ing, in the authentication method layer of the authenticator, a 25 function for carrying out, according to an authentication cre 30 Another technical solution of the present invention includes: A peer-to-peer access control method of a triple-unit struc ture, Which includes: dential, authentication, and implementing, in the bottom layer of the authenticator, a function for controlling, accord ing to a result of the authentication, Whether to permit the subject to access the authenticator; and implementing, in the authentication method layer of the authentication server, a function for carrying out, according to an authentication cre menting, in an authentication server, an authentication server function: 35 40 authentication process: sending, by the authentication method layer of the authen implementing, in a subject, a subject function; implement ing, in an authenticator, an authenticator function; and imple dential, authentication; implementing, in the subject and the authenticator, an authentication protocol function: implementing, in the authentication method layer of the subject together With the authentication method layer of the authenticator, the authentication protocol function; implementing, by the subject and the authenticator, an server. 45 setting, in the subject, an authentication method layer of the subject, a peer layer of the subject, an encapsulation layer of the subject and a bottom layer of the subject; setting, in the authenticator, an authentication method layer of the authen ticator, an authenticator layer of the authenticator, an encap sulation layer of the authenticator, a bottom layer of the authenticator and a transmission layer of the authenticator; and setting, in the authentication server, an authentication method layer of the authentication server, a peer layer of the authentication server, an encapsulation layer of the authenti cation server and a transmission layer of the authentication server; and implementing, in the authentication method layer of the ticator, a request message to the authentication method layer of the subject; and sending, by the authentication method subject, a function for carrying out, according to an authen layer of the subject, a response message to the authentication method layer of the authenticator to respond to a valid request message; and tication credential, authentication, and implementing, in the bottom layer of the subject, a function for transmitting data and for controlling, according to a result of the authentication, Whether the subject accesses the authenticator; implement ing, in the authentication method layer of the authenticator, a 50 implementing, upon termination of the authentication, access control: stopping sending, by the authentication method layer of the authenticator When being unable to authenticate the subject according to the response message, the request message and function for carrying out, according to an authentication cre 55 terminating message interaction, and notifying, by the ing to a result of the authentication, Whether to permit the subject to access the authenticator; and implementing, in the authentication method layer of the authentication server, a function for carrying out, according to an authentication cre authentication method layer of the authenticator, the bottom layer of the authenticator that the subject is not permitted to access the authenticator; or sending, by the authentication method layer of the authenticator, a failure message to the 60 authentication method layer of the subject, and notifying, by dential, authentication; implementing, in the subject, the authenticator and the the authentication method layer of the subject, the bottom layer of the subject that the subject is not permitted to access the authenticator; and stopping sending, by the authentication method layer of the dential, authentication, and implementing, in the bottom layer of the authenticator, a function for controlling, accord authentication server, an authentication protocol function: implementing, in the authentication method layer of the subject together With the authentication method layer of the authenticator When determining that the authentication is authenticator and together With the authentication method layer of the authentication server, the authentication protocol completed successfully according to the response message, function; 65 US 8,495,712 B2 6 5 implementing, by the subject, the authenticator and the The subject may be a terminal; the authenticator may be an authentication server, an authentication process: access controller; and the authentication server may be a sending, by the authentication method layer of the authen server. ticator during the message interaction between the authenti cation method layer of the subject and the authentication method layer of the authenticator, a request message to the authentication method layer of the authentication server, and When implementing the method of the present invention in the network structure of a speci?c type, the authentication carried out by the terminal (subject) and the access controller (authenticator) needs assistance of the server. The terminal sending, by the authentication method layer of the authenti can communicate with the access controller and cannot com municate with the server, while the access controller can cation server, a response message to the authentication method layer of the authenticator; and implementing, upon termination of the authentication, communicate with the terminal and can also communicate with the server. The terminal, the access controller and the access control: server all participate in the authentication, and the trust rela tionship is established between the terminal and the access stopping sending, by the authentication method layer of the authenticator when being unable to authenticate the subject according to the response message of the authentication method layer of the subject or according to the response message of the authentication method layer of the authenti controller directly, which renders security very reliable. In addition, the method of the present invention may be implemented in a triple-unit structure, but may be compatible to double-unit double-entity structure. In the case that there is no authentication server, the implementation of the method of cation server, the request message and terminating the mes sage interaction, and notifying, by the authentication method layer of the authenticator, the bottom layer of the authentica 20 tor that the subject is not permitted to access the authenticator; or sending, by the authentication method layer of the authen ticator, the failure message to the authentication method layer of the subject, and notifying, by the authentication method layer of the subject, the bottom layer of the subject that the 25 subject is not permitted to access the authenticator; and stopping sending, by the authentication method layer of the authenticator when determining that the authentication is completed successfully according to the response message of the authentication method layer of the subject or according to the response message of the authentication method layer of the authentication server, the request message and terminat 30 BRIEF DESCRIPTION OF THE DRAWINGS FIG. 1 is a diagram illustrating bidirectional access control between a terminal and a network in the prior art; FIG. 2 is a diagram illustrating a connection relationship of ing the message interaction, and notifying, by the authentica tion method layer of the authenticator, the bottom layer of the authenticator that the subject is permitted to access the the present invention is totally compatible to the double-unit double-entity network structure. Therefore, the method of the present invention may be implemented in both the double entity and the triple-entity structure, which may have full adaptability to the existing network structures. Besides, when implementing the method according to the present invention, the authentication protocol layer may use existing authentication protocols, or alternatively new authentication protocols may be devised. 35 authenticator; or sending, by the authentication method layer a network access control system of a double-unit double entity structure in the prior art; of the authenticator, the success message to the authentication FIG. 3 is a diagram illustrating a connection relationship of method layer of the subject, and notifying, by the authentica tion method layer of the subject, the bottom layer of the a network access control system of a double-unit triple-entity subject that the subject is permitted to access the authentica structure in the prior art; 40 FIG. 4 is a ?owchart illustrating a network peer-to-peer access control method of the present invention; FIG. 5 a diagram illustrating a connection relationship of a triple-unit triple-entity structure in which the network peer to-peer access control method of the present invention is 45 implemented; and tor. The request message sent by the authentication method layer of the authenticator to the authentication method layer of the subject contains a type ?eld, which type ?eld is a ?eld used for indicating a type of the request message; and the response message sent by the authentication method layer of the subject to the authentication method layer of the authen ticator contains a type ?eld, which type ?eld corresponds to the type ?eld contained in the request message; and the request message sent by the authentication method layer of the authenticator to the authentication method layer of the FIG. 6 is a ?owchart illustrating the method of the present invention being implemented in a speci?c certi?cate authen tication process. 50 Speci?cally: literminal, 2iaccess control, 3iaccess controller, 4inetwork. DETAILED DESCRIPTION OF THE EMBODIMENTS authentication server contains a type ?eld, which type ?eld is a ?eld used for indicating a type of the request message; and the response message sent by the authentication method layer of the authentication server to the authentication method 55 First, the principles of the present invention are described layer of the authenticator contains a type ?eld, which type ?eld corresponds to the type ?eld contained in the request as follows: An authentication protocol is a series of steps carried out by two or more participants to complete an authen message. tication. The authentication method layers of the subject, the The above method may further include the following steps: maintaining, as required, the interaction of sending the request message by the authentication method layer of the authenticator and responding to the request message by the authentication method layer of the subject; and maintaining, as required, the interaction of sending the request message by the authentication method layer of the authenticator and responding to the request message by the authentication method layer of the authentication server. authenticator and the authentication server are the implemen 60 65 tation of the authentication protocol in each of the partici pants, and they together construct an authentication protocol layer, so as to complete the authentication protocol function. In the present invention, the functions of the terminal, the access controller and the server are adjusted, so that the access controller has an authentication credential and an authentica tion function, and the network structure is changed to triple unit triple-entity. As shown in FIG. 5: US 8,495,712 B2 8 7 The ?rst entity/the ?rst unit: the terminal, which has an corresponding protocol of the authentication method is authentication credential, an authentication function, and a function for controlling whether to access the network. implemented in the terminal, the access controller and the server. The speci?c steps of the method according to the The second entity/the second unit: the access controller, present invention are as follows: 401. The access controller sends a request message to the which has an authentication credential, an authentication terminal to request starting authentication. The request mes sage has a type ?eld for indicating the type of the request. The function, and a function for controlling the access of the terminal according to the result of the authentication. The third entity/the third unit: the server, which has an type may be Identity, MD5-Challenge, etc.; authentication credential and an authentication function. 402. The terminal sends a response message to the access controller to respond to the valid request message. The response message contains a type ?eld, which corresponds to the type ?eld contained in the request message; 403. According to various authentication methods, the In this structure, the authentication carried out by the ter minal (subject) and the access controller (authenticator) needs assistance of the server (authentication server). The terminal can communicate with the access controller and cannot communicate with the server, while the access con troller can communicate with the terminal and can also com municate with the server. The terminal, the access controller and the server all participate in the authentication, and the trust relationship is established between the terminal and the access controller directly, which renders security very reli able. access controller sends a request message to the server if required; 404. The server sends a response message to the access controller. The sequence of the request message and the response message may be maintained for a required length; 405-406. The access controller sends a request message to 20 If only the subject and the authenticator is required to participate in the authentication protocol, the authentication method layer of the subject together with the authentication layer of the authenticator construct the authentication proto col layer, and complete the authentication protocol function together. If the server is required to participate in the authen tication carried out by the subject and the authenticator, the authentication method layer of the subject together with the authentication layer of the authenticator and together with the 25 authentication layer of the authentication server construct the 30 the terminal, and the terminal sends a response message to the access controller, where the sequence of the request message and the response message may maintain interaction as required. Of course, according to various authentication methods, the terminal may possibly not respond to the request message sent by the access controller. 407. The session is maintained until the access controller cannot authenticate the terminal. The access controller may stop sending the request message and terminate the message interaction, and the access controller may send a failure mes tion protocol function together. They three may run the same sage to the terminal and the access controller does not permit the terminal to access the access controller; or alternatively, the access controller may determine that a successful authen authentication protocol. Alternatively, different authentica tication has been completed, and the access controller may authentication protocol layer, and complete the authentica tion protocols may be run between any two of them. However there is essentially an association in the messages between those two of them, so that to achieve the same object, i.e. to stop sending the request message and terminate the message 35 and the access controller permits the terminal to access the access controller. At this time, the access control between the terminal and the access controller is completed. complete the authentication between the subject and the authenticator. In the art, the concepts of the bottom layer, the transmission layer, the encapsulation layer, the peer layer, the authenticator 40 layer and the authentication method layer are as follows: The bottom layer and the transmission layer: the bottom layer and the transmission layer are responsible for transmit In FIG. 6, the ASUE refers to the Authentication Suppli 45 50 implements repeated-frame detection and retransmission, authenticator layer. The peer layer and the authenticator layer: the encapsula Speci?cally: 55 method layer implements an authentication algorithm, and transmits messages via the peer layer and the authenticator layer. 601. The AE sends a request message to the ASUE; 602. The ASUE sends a response message to the AE; 603. The AE sends a request message to the ASE; 604. The ASE sends a response message to the AE; and 605. The AE sends a request message to the ASUE; the ASUE receives the request message, and does not need to send a response message; and the AE stops sending mes sages. For the de?nitions of the speci?c ?elds contained in the FIG. 4 is a ?owchart illustrating a network peer-to-peer access control method of the present invention. Speci?cally, a subject function is implemented in the subject, an authenti i.e. the server, which implements the authentication server function. The authentication method described in this stan dard needs to be implemented in all the ASUE, the AE and the ASE, which complies with and thus may be implemented in the model of the method according to the present invention. and transmits messages between the peer layer and the tion layer parses the TEAP data frames and transmits them to the peer layer or the authenticator layer. The peer layer and the authenticator layer parse the received data packets and trans mit them to the peer layer or the authenticator layer. The authentication method layer: the authentication cant Entity, i.e. the terminal, which implements the subject function; the AE refers to the Authenticator Entity, i.e. the access controller, which implements the authenticator func tion; and the ASE refers to the Authentication Service Entity, of the adjacent bottom layer. The encapsulation layer: the encapsulation layer transmits and receives the TEAP data packets via the bottom layer, An embodiment of the present invention is implemented in the model of the authentication method de?ned in the national standard GB 1 5629.1 l-2003/XG1 -2006. The certi?cate authentication process described in this standard is as shown in FIG. 6, and speci?cally includes the following: ting and receiving Triple-unit Extensible Authentication Pro tocol (TEAP) data frames between the peer and the authen ticator. The transmission layer is a logic concept, which means that this layer may be of a technique different from that interaction, or may send a success message to the terminal message, reference can be made to the de?nitions in the national standard GB 1 5629.1 l-2003/XG1 -2006. 65 Another embodiment of the present invention may be cator function is implemented in the authenticator, an authen implemented in the Otway-Rees protocol, referring to Otway, tication server function is implemented in the server; and a D. and Ress, 0., “Ef?cient and timely mutual authentication” US 8,495,712 B2 9 10 ACE OSR, Vol. 21, No. 1, pp. 8-10, January 1987. This protocol is used for identity authentication, and cannot be used in conventional network structures. Speci?c steps with the method of the present invention cooperating with this departing from the substance and scope of the present inven tion are all encompassed within the scope of the present invention. Therefore, the scope of the present invention is de?ned by the appended claims. What is claimed is: 1. A peer-to-peer access control method of a triple-unit protocol are as follows: The participants include Alice, Bob and Trent. 1] Bob sends a request message to request starting authen structure, comprising: implementing, in a subject, a subject function; implement tication; 2] Alice generates a piece of message, which includes an index number, her identity, Bob’ s identity and a random num ing, in an authenticator, an authenticator function; and implementing, in an authentication server, an authenti cation server function: ber, and encrypts this piece of message using the shared key of her and Trent, and then sends the ciphertext together with setting, in the subject, an authentication method layer of the subject, a peer layer of the subject, an encapsulation layer of the subject and a bottom layer of the subject; setting, in the authenticator, an authentication method layer of the authenticator, an authenticator layer of the authenticator, an encapsulation layer of the authentica the index number, the identities of Alice and Bob to Bob; 3] Bob generates a piece of message, which includes a new random number, an index number, the identities of Alice and Bob, and encrypts this piece of message using the shared key of him and Trent, and then sends the ciphertext together with the ciphertext ofAlice, the index number, and the identities of Alice and Bob to Trent; 4] Trent generates a random session key, and then generates two pieces of messages. The ?rst piece of message is to encrypt the random number ofAlice and the session key using the shared key of him andAlice. The second piece of message is to encrypt the random number of Bob and the session key using the shared key of him and Bob. Finally, Trent sends the two pieces of messages together with the index numbers to tor, a bottom layer of the authenticator and a transmis sion layer of the authenticator; and setting, in the authen 20 tication server, an authentication method layer of the authentication server, a peer layer of the authentication server, an encapsulation layer of the authentication server and a transmission layer of the authentication server; and 25 implementing, in the authentication method layer of the subject, a function for carrying out, according to an authentication credential, authentication, and imple Bob; 5] Bob sends the piece of message belonging to Alice as well as the index number to Alice; and 6] If all the random numbers are matched and the index 30 number is not changed during the communication process, the authentication succeeds. It can be seen that Alice, Bob and Trent respectively imple ment the subject, the authenticator and the authentication server functions, and this authentication protocol can be 35 implemented in the method of the present invention. To sum up, when implementing the method of the present invention in the network structure of a speci?c type, the authentication carried out by the terminal (subject) and the access controller (authenticator) needs assistance of the menting, in the bottom layer of the subject, a function for transmitting data and for controlling, according to a result of the authentication, whether the subject accesses the authenticator; implementing, in the authentication method layer of the authenticator, a function for carrying out, according to an authentication credential, authenti cation, and implementing, in the bottom layer of the authenticator, a function for controlling, according to a result of the authentication, whether to permit the sub ject to access the authenticator; and implementing, in the authentication method layer of the authentication server, a function for carrying out, according to an authentica 40 tion credential, authentication; implementing an authentication protocol function, com server. The terminal can communicate with the access con troller and cannot communicate with the server, while the prising: access controller can communicate with the terminal and can implementing, in the authentication method layer of the subject together with the authentication method layer also communicate with the server. The terminal, the access controller and the server all participate in the authentication, and the trust relationship is established between the terminal and the access controller directly, which renders security very reliable. In addition, the method of the present invention may be implemented in a triple-unit structure, but may be compatible to double-unit double-entity structure. With comparison with 45 authentication protocol function; implementing an authentication process, comprising: sending, by the authentication method layer of the 50 Besides, when implementing the method according to the present invention, the authentication protocol layer may use existing authentication protocols, or alternatively new authentication protocols may be devised. authentication method layer of the subject, a response message to the authentication method layer of the authenticator to respond to a valid request message; 55 invention are not limited to those above. Various variations and modi?cations devised by those skilled in the art without sending, by the authentication method layer of the authenticator, a request message to the authentication method layer of the authentication server, and send ing, by the authentication method layer of the authen tication server, a response message to the authentica 60 The above embodiments are employed to describe and explain the principles of the present invention. It can be understood that the speci?c embodiments of the present authenticator, a request message to the authentication method layer of the subject; and sending, by the FIGS. 2 and 5, it is known that in the case that there is no authentication server, the implementation of the method of the present invention is totally compatible to the double-unit double-entity network structure. Therefore, the method of the present invention may be implemented in both the double entity and the triple-entity structure, which may have full adaptability to the existing network structures. of the authenticator and together with the authentica tion method layer of the authentication server, the 65 tion method layer of the authenticator, so that the authentication server authenticates the authenticator; and authenticating the authentication server by the subject through the message interaction between the subject and the authenticator together with the message inter action between the authenticator and the authentica tion server; and US 8,495,712 B2 11 12 tion method layer of the authenticator contains a type ?eld, which type ?eld corresponds to the type ?eld contained in the request message; and the request message sent by the authen tication method layer of the authenticator to the authentica implementing, upon termination of the authentication, access control, comprising: carrying out at least one of following steps: stopping the sending the request message and terminating mes sage interaction, by the authentication method layer of the tion method layer of the authentication server contains a type ?eld, which type ?eld is a ?eld used for indicating a type of the request message; and the response message sent by the authentication method layer of the authentication server to authenticator when being unable to authenticate the subject according to at least one of the response mes sage of the authentication method layer of the subject and the response message of the authentication the authentication method layer of the authenticator contains a type ?eld, which type ?eld corresponds to the type ?eld contained in the request message. method layer of the authentication server, and notify ing, by the authentication method layer of the authen ticator, the bottom layer of the authenticator that the subject is not permitted to access the authenticator; and sending, by the authentication method layer of the authenticator, a failure message to the authentication 5. The peer-to-peer access control method of a triple-unit 5 method layer of the subject, and notifying, by the authentication method layer of the subject, the bottom layer of the subject that the subject is not permitted to access the authenticator; and carrying out at least one of following steps: stopping the sending the request message and terminating the mes sage interaction, by the authentication method layer server. of the authenticator when determining that the authentication is completed successfully according to at least one of the response message of the authenti cation method layer of the subject and the response message of the authentication method layer of the authentication server, and notifying, by the authenti cation method layer of the authenticator, the bottom layer of the authenticator that the subject is permitted to access the authenticator; and sending, by the authentication method layer of the authenticator, a 25 subject that the subject is permitted to access the authenticator. 2. The peer-to-peer access control method of a triple-unit structure according to claim 1, wherein the request message sent by the authentication method layer of the authenticator to the authentication method layer of the subject contains a type ?eld, which type ?eld is a ?eld used for indicating a type of the request message; and the response message sent by the authentication method layer of the subject to the authentica tion method layer of the authenticator contains a type ?eld, which type ?eld corresponds to the type ?eld contained in the request message. 7. The peer-to-peer access control method of a triple-unit 30 40 structure according to claim 4, further comprising: maintaining, as required, the interaction of sending the request message by the authentication method layer of the authenticator and responding to the request message by the authentication method layer of the subject; and maintaining, as required, the interaction of sending the request message by the authentication method layer of the authenticator and responding to the request message by the authentication method layer of the authentication server. 45 9. The peer-to-peer access control method of a triple-unit structure according to claim 1, wherein the subject is a termi nal; the authenticator is an access controller; and the authen tication server is a server. 10. The peer-to-peer access control method of a triple-unit 50 structure according to claim 1, wherein the subject is capable of communicating authentication protocol with the authenti cator and is not capable of communicating authentication protocol with the authentication server, while the authentica 4. The peer-to-peer access control method of a triple-unit structure according to claim 1, wherein the request message sent by the authentication method layer of the authenticator to the authentication method layer of the subject contains a type ?eld, which type ?eld is a ?eld used for indicating a type of the request message; and the response message sent by the authentication method layer of the subject to the authentica structure according to claim 2, further comprising: maintaining, as required, the interaction of sending the request message by the authentication method layer of the authenticator and responding to the request message by the authentication method layer of the subject. 8. The peer-to-peer access control method of a triple-unit 35 3. The peer-to-peer access control method of a triple-unit structure according to claim 1, further comprising: maintaining, as required, the interaction of sending the request message by the authentication method layer of the authenticator and responding to the request message by the authentication method layer of the subject. 6. The peer-to-peer access control method of a triple-unit structure according to claim 1, wherein the subject is a termi nal; the authenticator is an access controller; and the authen tication server is a server. success mes sage to the authentication method layer of the subject, and notifying, by the authentication method layer of the subject, the bottom layer of the structure according to claim 1, further comprising: maintaining, as required, the interaction of sending the request message by the authentication method layer of the authenticator and responding to the request message by the authentication method layer of the subject; and maintaining, as required, the interaction of sending the request message by the authentication method layer of the authenticator and responding to the request message by the authentication method layer of the authentication 55 tor is capable of communicating authentication protocol with the subject and is also capable of communicating authentica tion protocol with the authentication server; the subject, the authenticator and the authentication server all participate in the authentication, and a trust relationship is established between the subject and the authenticator directly. * * * * * UNITED STATES PATENT AND TRADEMARK OFFICE CERTIFICATE OF CORRECTION PATENT No. : 8,495,712 B2 APPLICATION NO. : 12/519955 DATED INVENTOR(S) : July 23, 2013 : Xiaolong Lai et a1. Page 1 of 1 It is certified that error appears in the above-identi?ed patent and that said Letters Patent is hereby corrected as shown below: On the Title Page: The first or sole Notice should read - Subject to any disclaimer, the term of this patent is extended or adjusted under 35 U.S.C. 154(b) by 581 days. Signed and Sealed this Sixth Day of May, 2014 WMZ44L_ Michelle K. Lee Deputy Director 0fthe United States Patent and Trademark O?ice
© Copyright 2026 Paperzz