Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Mobile terminal access method

An access method and mobile terminal technology, applied in the field of network security, can solve problems such as the inability of users to perform unified scheduling, achieve the effect of reducing hardware costs and improving management efficiency

Active Publication Date: 2015-04-01
国家信息中心
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, since Internet line access and VPDN line access are independent of each other, users cannot perform unified scheduling

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Mobile terminal access method
  • Mobile terminal access method
  • Mobile terminal access method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0024] Such as figure 1 As shown, this embodiment provides a mobile terminal access method, including:

[0025] Step 101, the user terminal sends an access request to a preset access server.

[0026] In this embodiment, in step 101, the access server can uniformly receive the access requests sent by all user terminals; the access request carries the access mode. Wherein, the access mode includes: Internet line access or VPDN line access.

[0027] Step 102, the access server receives the access request sent by the user terminal, and determines the access method according to the access request.

[0028] In this embodiment, step 102 may include: the access server monitors whether an access request is received; if yes, the access server determines an access method according to the access request; otherwise, continues to monitor.

[0029] Step 103, if the access mode is VPDN line access, the access server sends the access request to the preset LNS server.

[0030] Step 104: Aft...

Embodiment 2

[0035] Such as figure 2 As shown, this embodiment provides a mobile terminal access method, which is the same as figure 1 Similar as shown, except that it also includes:

[0036] Step 107, when the verification result is that the verification is successful, the access server returns a prompt message prompting the user to input VPN information to the user terminal.

[0037] Step 108, the user terminal prompts after receiving the prompt message sent by the access server.

[0038] Step 109, the user terminal receives the VPN information input by the user according to the prompt, and sends it to the access server.

[0039] In this embodiment, the VPN information in step 109 carries the VPN type to be accessed.

[0040] Step 110, the access server receives the VPN information sent by the user terminal, and selects a first VPN gateway from the preset VPN gateway cluster according to the VPN information.

[0041]In this embodiment, the process of selecting the first VPN gateway ...

Embodiment 3

[0050] Such as Figure 4 As shown, the mobile terminal access method provided in this embodiment is the same as figure 1 Similar as shown, except that it also includes:

[0051] Step 115, if it is Internet line access, the access server selects a second VPN gateway from the preset VPN gateway cluster according to the access request.

[0052] In this embodiment, if the access is via an Internet line, the access request not only carries the access method, but also carries the type of VPN to be accessed. The process of selecting the second VPN gateway through step 115 includes: the access server determines the VPN type according to the access request; the access server selects the second target gateway cluster from the preset VPN gateway cluster according to the VPN type; the access server selects the second target gateway cluster from the first VPN gateway cluster; The second VPN gateway is selected from the second target gateway cluster. In particular, in order to achieve lo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a mobile terminal access method and relates to the field of network security. The mobile terminal access method is provided for solving the problem that unified schedule cannot be performed by the prior art. The method comprises the following steps that S10, a user terminal transmits an access request to a preset access server which can uniformly receive the access requests sent from all user terminals, wherein access ways are carried in the access requests; S20, the access service receives the access request transmitted by the user terminal and determines the access way according to the access request; S30, if the access way is virtual private dial-up network (VPDN) line access, the access server transmits the access request to a preset LonWorks Network Server (LNS); S40, after receiving the access request transmitted by the access server, the LNS verifies the access request, obtains a verification result and returns the verification result to the access server; S50, the access server receives the verification result returned by the LNS; S60, when the verification result is failed by verification, the access server returns the verification failed information to the user terminal.

Description

technical field [0001] The invention relates to the field of network security, in particular to a mobile terminal access method. Background technique [0002] In the prior art, when a mobile terminal accesses an information system, it can be accessed through an Internet line or through a virtual private dial-up network (Virtual Private Dial-up Networks, VPDN) line; Internet line access and VPDN line access Need to connect to VPN gateway and LNS server respectively, and VPN gateway and LNS server are independent of each other, that is, Internet line access and VPDN line access are independent of each other. [0003] However, since Internet line access and VPDN line access are independent of each other, users cannot perform unified scheduling. Contents of the invention [0004] The invention provides a mobile terminal access method, which can facilitate users to uniformly schedule access requests of Internet lines and VPDN lines. [0005] The present invention adopts the f...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/46H04L29/06H04M7/00
Inventor 罗海宁冷默韩帅邵国安吕品周民杨绍亮杨洪伟
Owner 国家信息中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products