Eureka AIR delivers breakthrough ideas for toughest innovation challenges, trusted by R&D personnel around the world.

Network access method, server and storage medium

A network access and network technology, applied in the field of communication, can solve problems such as terminal fraud and intelligent terminal network security protection defects, and achieve the effect of improving security

Active Publication Date: 2020-11-17
CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD +1
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The inventors have found that at least the following problems exist in the prior art: when the malicious party obtains the algorithm of the virtual number and the virtual number, the malicious party will calculate the real number of the terminal according to the algorithm, thereby stealing the number of the terminal for fraud; it can be seen that In the existing technology, there are defects in the security protection of smart terminals when they access the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access method, server and storage medium
  • Network access method, server and storage medium
  • Network access method, server and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0025] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the embodiments of the present invention will be described in detail below with reference to the accompanying drawings. However, those skilled in the art can understand that in each embodiment of the present invention, many technical details are provided for readers to better understand the present application. However, even without these technical details and various changes and modifications based on the following embodiments, the technical solutions claimed in this application can also be realized. The division of the following embodiments is for the convenience of description, and should not constitute any limitation to the specific implementation of the present invention, and the various embodiments can be combined and referred to each other on the premise of no contradiction.

[0026] The first embodiment of the present invention relates to a netwo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention relates to the field of communication, and discloses a network access method, a server and a storage medium. The method comprises the steps of obtaining attribute information of a to-be-accessed network of a terminal; authenticating the network to be accessed based on the attribute information; and if the authentication succeeds, sending a connection instruction tothe terminal for the terminal to access the to-be-accessed network. The method comprises the following steps: before a terminal accesses a to-be-accessed network, acquiring attribute information of the to-be-accessed network of the terminal, authenticating the to-be-accessed network, and after authentication succeeds, enabling the terminal to access the to-be-accessed network; through the method,when the terminal does not access the network to be accessed, the network to be accessed from an illegal source is screened out, so that the communication of the network terminal to be accessed from the illegal source is avoided, a malicious party is prevented from stealing the real account of the terminal when the terminal accesses the network to be accessed, and the security of the terminal in the network access process is improved.

Description

technical field [0001] The embodiments of the present invention relate to the communication field, and in particular to a network access method, server and storage medium. Background technique [0002] At present, with the rapid development of artificial intelligence, people's lives have gradually entered the era of intelligence. Today, there are many kinds of smart devices in family life, such as smart speakers, smart TVs, set-top boxes and other household smart terminals; however, in smart When terminal devices are connected to the network, it is easy for malicious parties to steal their accounts. Therefore, the security of smart terminal network access has become particularly important and has become an important direction of development at this stage. One solution in the prior art is to use a virtual number to hide the real number of the terminal when the terminal is connected to the network, so as to prevent malicious parties from stealing the number of the terminal for...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L29/06H04L12/28
CPCH04L63/10H04L63/08H04L12/2856
Inventor 刘渊张星成刘胜江
Owner CHINA MOBILEHANGZHOUINFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Eureka Blog
Learn More
PatSnap group products