Method, device and system for controlling access to network terminal
A network terminal and network access technology, which is applied in the field of controlling access to network terminals, can solve problems such as inconvenient network authentication, and achieve the effects of improving authentication reliability, flexible and convenient user operations, and improving security levels
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0033] In the embodiment of the present invention, the system networking mode for implementing the method of the embodiment of the present invention is as follows figure 1 As shown, the system includes: a wireless terminal (such as a wireless USB-Modem), a network terminal (such as a PC or a portable terminal) and a certificate authentication CA server.
[0034] The wireless terminal and the network terminal are connected to each other, wherein the wireless terminal is used to accept the authentication of the wireless network side; after the authentication of the wireless terminal is passed, the wireless terminal uses the private key stored by itself and the corresponding authentication key on the CA server. The public key certificate is used for CA authentication; and after the CA authentication is passed, the access to the network terminal is authorized.
[0035] The wireless terminal includes a SIM / UIM card or flash memory, and the SIM / UIM card or flash memory can be used t...
Embodiment 2
[0054] Such as image 3 As shown, a method for controlling access to a network terminal provided by an embodiment of the present invention is used to realize authentication and authentication of PC or other network terminal startup login, including the following steps:
[0055] Step S301, connecting the wireless terminal to the PC, and accessing the network through the wireless terminal;
[0056] The wireless terminal device starts, the wireless terminal accesses the wireless network through the default parameters, and reports the USB port to the PC;
[0057] Step S302, the wireless network authenticates the wireless terminal;
[0058] The wireless terminal is connected to the PC host. When connecting to the wireless network, the Subscriber Identity Model (SIM, Subscriber Identity Model) card authentication is required. If the authentication passes, the wireless network connection is successful, and the CA server is accessed through the wireless network and interacts with the...
Embodiment 3
[0072] In addition, a method for controlling access to a network terminal provided by an embodiment of the present invention further includes the step of prohibiting login to the network terminal after the wireless terminal is disconnected, specifically as follows:
[0073] When the user disconnects the physical connection between the wireless terminal and the PC, PC authentication requires that the Logon.dll module of the Windows system detects that the wireless terminal does not exist, and the PC host directly locks the screen.
[0074] Such as Figure 4 As shown, a method for controlling access to a network terminal provided by an embodiment of the present invention also includes the steps of unlocking the screen saver process when the PC host is in a screen-locked state, specifically as follows:
[0075] Step S401, the wireless terminal device is started, and the wireless terminal reports the USB port to the PC and connects to the Internet through default parameters;
[0...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 