Mobile terminal access method
An access method and mobile terminal technology, applied in the field of network security, can solve problems such as the inability of users to perform unified scheduling, achieve the effect of reducing hardware costs and improving management efficiency
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0024] Such as figure 1 As shown, this embodiment provides a mobile terminal access method, including:
[0025] Step 101, the user terminal sends an access request to a preset access server.
[0026] In this embodiment, in step 101, the access server can uniformly receive the access requests sent by all user terminals; the access request carries the access mode. Wherein, the access mode includes: Internet line access or VPDN line access.
[0027] Step 102, the access server receives the access request sent by the user terminal, and determines the access method according to the access request.
[0028] In this embodiment, step 102 may include: the access server monitors whether an access request is received; if yes, the access server determines an access method according to the access request; otherwise, continues to monitor.
[0029] Step 103, if the access mode is VPDN line access, the access server sends the access request to the preset LNS server.
[0030] Step 104: Aft...
Embodiment 2
[0035] Such as figure 2 As shown, this embodiment provides a mobile terminal access method, which is the same as figure 1 Similar as shown, except that it also includes:
[0036] Step 107, when the verification result is that the verification is successful, the access server returns a prompt message prompting the user to input VPN information to the user terminal.
[0037] Step 108, the user terminal prompts after receiving the prompt message sent by the access server.
[0038] Step 109, the user terminal receives the VPN information input by the user according to the prompt, and sends it to the access server.
[0039] In this embodiment, the VPN information in step 109 carries the VPN type to be accessed.
[0040] Step 110, the access server receives the VPN information sent by the user terminal, and selects a first VPN gateway from the preset VPN gateway cluster according to the VPN information.
[0041]In this embodiment, the process of selecting the first VPN gateway ...
Embodiment 3
[0050] Such as Figure 4 As shown, the mobile terminal access method provided in this embodiment is the same as figure 1 Similar as shown, except that it also includes:
[0051] Step 115, if it is Internet line access, the access server selects a second VPN gateway from the preset VPN gateway cluster according to the access request.
[0052] In this embodiment, if the access is via an Internet line, the access request not only carries the access method, but also carries the type of VPN to be accessed. The process of selecting the second VPN gateway through step 115 includes: the access server determines the VPN type according to the access request; the access server selects the second target gateway cluster from the preset VPN gateway cluster according to the VPN type; the access server selects the second target gateway cluster from the first VPN gateway cluster; The second VPN gateway is selected from the second target gateway cluster. In particular, in order to achieve lo...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com