Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method for local area network access authentication of casual user

A temporary user, network access technology, applied in user identity/authority verification, data exchange through path configuration, nan, etc., can solve the problems of fast personnel flow, poor security, and complicated user management process in public network access areas. , to achieve the effect of simple and standardized management process, improved safety and high safety

Active Publication Date: 2010-08-18
CHINA MOBILE GROUP DESIGN INST
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This authentication scheme has the following disadvantages: first, the fixed user name and fixed password are easily stolen and used, and the security is poor; second, the flow of people in the public network access area is fast, and the management process for users is complicated, which is not conducive to management and network access authentication

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for local area network access authentication of casual user
  • Method for local area network access authentication of casual user
  • Method for local area network access authentication of casual user

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0015] In order to clearly illustrate the technical features of this solution, the present invention will be described in detail below through specific implementation modes and in conjunction with the accompanying drawings.

[0016] As shown in FIG. 1 , it is a schematic diagram of the system structure connection of the authentication method of the present invention. The client's computer is connected to the switch with the built-in Portal server, the switch is connected to the authentication server and the authentication server respectively, the authentication server is connected to the authentication server, and the information sending unit in the authentication server communicates with the mobile phone of the internal user through the communication network. The authentication server is a Radius server, or any authentication server. The Portal server built in the switch can also be a WEB server.

[0017] In the signaling flowchart shown in Fig. 2, an implementation scheme o...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a method for implementing a user access authentication in a local area network, especially to a method for implementing a casual user access authentication in a public local area network. Firstly an internal user applies a casual user name and a key for the casual user through the authentication of a authentication server, the authentication server dynamically generates the casual user name and the key, then the casual user name and the key are stored in a user list of the authentication server, simultaneously the casual user name and the key are transmitted to a mobile phone of the internal user, the casual user uses the casual user name and the key for access authentication, and visits the authorized network resource after the authentication of the authentication server. The method of the invention adopts a double-factor and strong authentication system, the internal user is authenticated once, and the casual user is authenticated twice. The method can greatly improves the system safety, the casual user name and the key are all dynamically generated which are not easy to steal with high safety, and the management process for the casual user is simple andstandard.

Description

Technical field: [0001] The invention relates to a method for implementing user access authentication in a local area network, in particular to a method for performing access authentication for temporary users in a public local area network. Background technique: [0002] Generally speaking, in order to gain access to a certain service, it is necessary to enter a user name and password. In the existing public network access WEB authentication technical solutions, the method of entering a fixed user name and a fixed password is often used for authentication. The general process is as follows. A temporary user submits an access application, and the network administrator adds a user name and password to the authentication server. The temporary user uses the user name and password to perform network access authentication. After the authentication is passed, the service item can be accessed. This authentication scheme has the following disadvantages: first, the fixed user name an...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L12/28H04W4/00H04L9/32
Inventor 于常辉张建强韩在吉
Owner CHINA MOBILE GROUP DESIGN INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products