Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access control method and equipment

An access control device and access control technology, applied in the network field, can solve the problems of limited personalized management and difficult control, and achieve the effect of personalized and refined management.

Active Publication Date: 2011-06-22
HUAWEI DEVICE (SHENZHEN) CO LTD
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Embodiments of the present invention provide an access control method and access control equipment, which are used to solve the proble

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access control method and equipment
  • Access control method and equipment
  • Access control method and equipment

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0018] The embodiment of the present invention provides an access control method. The corresponding relationship between the verification code and the unique identification code of the terminal is established for the terminal that has passed the verification, and the unique identification code is compared with the unique identification code of the terminal. The corresponding relationship of the verification code manages the access of the account to the Internet. The embodiment of the present invention also provides corresponding access control equipment. Detailed descriptions are given below.

[0019] Please refer to figure 1 , The basic flow diagram of an access control method provided by an embodiment of the present invention mainly includes:

[0020] Step S101, verify the terminal trying to access the Internet.

[0021] Generally, a terminal accesses the Internet through an access control device. In the embodiment of the present invention, before a terminal such as a PC accesse...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an access control method, which is used for solving the problems of control operation difficulties and personal management restraints of the prior art in control over the network access of a user. The method comprises the following steps of: checking a terminal which tries to access to the Internet; accessing the terminal to the Internet if the terminal passes through the checking, and establishing a corresponding relation between a checking code by which the terminal passes through checking and a unique identification code of the terminal; and managing the Internet access of an account according to the corresponding relation between the unique identification code and the checking code. In the method, a healthy surfing environment can be constructed; moreover, the Internet access of the terminal can be controlled on the access control equipment by text account management instead of terminal management, so the method is applicable to the actual operation level ofmost users; meanwhile, different text accounts are endowed with different authorities having smaller particles, so the management is actually detailed and becomes more personal.

Description

technical field [0001] The present invention relates to the network field, in particular to an access control method and access control equipment. Background technique [0002] The benefit brought by the development of Internet (Internet) technology to modern life is that it can provide massive resources for people to access conveniently, especially when the home network enters ordinary families and various terminals such as personal computers (PC, Personal Computer) and mobile phones. The convenience of obtaining resources through the Internet is more obvious. However, due to the intermingling of good and bad resources on the Internet, sometimes it is necessary to restrict certain users, for example, guardians need to restrict or monitor minors from accessing bad resources on the Internet. [0003] In the prior art, a method for restricting users from accessing resources on the Internet is through software on terminals such as PCs. Because the use of software needs to cha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L12/56H04L29/06
Inventor 刘建锋舒平芬
Owner HUAWEI DEVICE (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products