Verification method and apparatus for accessing network

A network access and authentication method technology, applied in the field of network access authentication methods and devices, can solve the problems of not being able to detect and prevent user accounts from being stolen in time, and account security is low, so as to ensure account and property security and timeliness Strong, time-saving and manpower-saving effect

Inactive Publication Date: 2017-05-17
CHINA MOBILE GROUP DESIGN INST
View PDF5 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of the present invention provides an authentication method and device for accessing the network, which is used to solve the problems in the prior art that the user account cannot be discovered and prevented from being stolen in time, and the account security is low

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Verification method and apparatus for accessing network
  • Verification method and apparatus for accessing network
  • Verification method and apparatus for accessing network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings. Obviously, the described embodiments are only some embodiments of the present invention, rather than all embodiments . Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0038] Terminals and network access devices in the embodiments of the present invention include but are not limited to personal computers, server computers, handheld or laptop devices, mobile devices (such as mobile phones, mobile phones, tablet computers, etc.), multiprocessor systems, consumer Electronic devices, minicomputers, mainframe computers, distributed computing environments including any of the above systems or devices, etc.

[...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of computers, and discloses a verification method and apparatus for accessing a network. The method includes the following steps: a server receiving a network access request transmitted by a network access device, the network access request carrying an account in binding relation with a terminal and access place information of the network access device; the server, based on the access place information, determining the geographical position of the network access device, and determining the geographical position of the terminal in binding relation with the account; the server comparing the geographical position of the terminal and the geographical position of the network access device; and if the distance between the geographical position of the terminal and the geographical position of the network access device is smaller than a threshold, then the server processing the network access request. According to the invention, the method addresses the problem of failure to discover embezzlement of user accounts in time and stop the embezzlement instantly as well as low safety of accounts of prior art.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to an authentication method and device for accessing a network. Background technique [0002] With the rapid development of Internet technology, people's life is increasingly networked and informationized. The Internet usually uses a unique login account and login password to keep the user's network private information. Nowadays, Trojan horse viruses, phishing websites and other means appear, which can steal the user's login account and login password, and because the phenomenon of account theft cannot be eliminated from the root cause, it is difficult to guarantee the security of the user's login environment. [0003] For example, when a user accesses a wireless local area network (WLAN, Wireless Local Area Networks), he needs to input his own login account and password, and the operator can charge according to the time or traffic used by the user for the wireless local area net...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06H04W12/126H04W12/64
CPCH04L63/08H04L63/107H04W12/06H04W4/02
Inventor 董春辉杜潘峰李坤杨滨
Owner CHINA MOBILE GROUP DESIGN INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products