Network access method, system and authentication server

An authentication server and network access technology, applied in the fields of systems, authentication servers, and network access methods, can solve the problems of high cost, poor practicability, complex authentication process, etc., and achieve simple access process and access cost. The effect of lowering and reducing the probability of an attack

Active Publication Date: 2015-03-11
BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The certification process of these methods is more complicated, the cost is higher, and the implementability is not strong.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access method, system and authentication server
  • Network access method, system and authentication server
  • Network access method, system and authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purposes, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments These are some embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.

[0022] First of all, it is explained that in the following embodiments of the present invention, the type of network to be accessed by the access user is not limited. The network to be accessed by the access user may be a wired network or a wireless network. The scenarios in which the access user is authenticated and can access the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a network access method, system and authentication server. The method includes: when it is determined that the identity authentication of the access user passes, the authentication server sends a short message requesting instructions to confirm whether to open the Internet access channel through the short message conversion device to the communication terminal of the access user; When the confirmation information is returned, the instruction information of opening the Internet access channel is sent to the access device, so that the access user can access the network. The technical scheme of the invention solves the problem that illegal users use stolen user names and passwords for identity authentication, reduces the probability of illegal users attacking the network, and improves the security of the network. In addition, compared with the prior art, the technical solution of the present invention has the advantages of simple access process and low access cost.

Description

technical field [0001] The present invention relates to wireless network technology, in particular to a network access method, system and authentication server. Background technique [0002] With the development of wireless network technology, wireless networks are becoming more and more popular, and more and more enterprises, units and individuals begin to use wireless networks for network access. Wireless networks transmit information through wireless signals, and there are some natural security problems compared with wired networks. For example, since wireless signals are transmitted in the air, access can be made to any place that can be covered by wireless signals, which means that user accounts and passwords may be stolen. When the account and password are maliciously stolen, the attacker can illegally attack the entire wireless network, and since it is impossible to track and locate which account the attacker has stolen, it is impossible to detect the attacked wirele...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W4/14H04W12/08H04W12/06H04W12/122H04W12/126
Inventor 臧志飞林雁敏
Owner BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products