Unlock instant, AI-driven research and patent intelligence for your innovation.

Method, device and system for controlling access to network terminal

A network terminal and network access technology, which is applied in the field of controlling access to network terminals, can solve problems such as inconvenient network authentication, and achieve the effects of improving authentication reliability, flexible and convenient user operations, and improving security levels

Active Publication Date: 2013-04-24
HUAWEI DEVICE CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Then it is inconvenient to perform network authentication when the PC cannot access the wired network or the laptop cannot be connected to the wired network when going out to work.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, device and system for controlling access to network terminal
  • Method, device and system for controlling access to network terminal
  • Method, device and system for controlling access to network terminal

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0033] In the embodiment of the present invention, the system networking mode for implementing the method of the embodiment of the present invention is as follows figure 1 As shown, the system includes: a wireless terminal (such as a wireless USB-Modem), a network terminal (such as a PC or a portable terminal) and a certificate authentication CA server.

[0034] The wireless terminal and the network terminal are connected to each other, wherein the wireless terminal is used to accept the authentication of the wireless network side; after the authentication of the wireless terminal is passed, the wireless terminal uses the private key stored by itself and the corresponding authentication key on the CA server. The public key certificate is used for CA authentication; and after the CA authentication is passed, the access to the network terminal is authorized.

[0035] The wireless terminal includes a SIM / UIM card or flash memory, and the SIM / UIM card or flash memory can be used t...

Embodiment 2

[0054] Such as image 3 As shown, a method for controlling access to a network terminal provided by an embodiment of the present invention is used to realize authentication and authentication of PC or other network terminal startup login, including the following steps:

[0055] Step S301, connecting the wireless terminal to the PC, and accessing the network through the wireless terminal;

[0056] The wireless terminal device starts, the wireless terminal accesses the wireless network through the default parameters, and reports the USB port to the PC;

[0057] Step S302, the wireless network authenticates the wireless terminal;

[0058] The wireless terminal is connected to the PC host. When connecting to the wireless network, the Subscriber Identity Model (SIM, Subscriber Identity Model) card authentication is required. If the authentication passes, the wireless network connection is successful, and the CA server is accessed through the wireless network and interacts with the...

Embodiment 3

[0072] In addition, a method for controlling access to a network terminal provided by an embodiment of the present invention further includes the step of prohibiting login to the network terminal after the wireless terminal is disconnected, specifically as follows:

[0073] When the user disconnects the physical connection between the wireless terminal and the PC, PC authentication requires that the Logon.dll module of the Windows system detects that the wireless terminal does not exist, and the PC host directly locks the screen.

[0074] Such as Figure 4 As shown, a method for controlling access to a network terminal provided by an embodiment of the present invention also includes the steps of unlocking the screen saver process when the PC host is in a screen-locked state, specifically as follows:

[0075] Step S401, the wireless terminal device is started, and the wireless terminal reports the USB port to the PC and connects to the Internet through default parameters;

[0...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a method for controlling the access to a network terminal. The method comprises the following steps: a wireless terminal receives a wireless terminal side and authenticates the wireless terminal side; the wireless terminal carries out the CA authentication by using a self-saving private key and a public key certificate corresponding to the wireless terminal on an authentication CA server after the authentication of the wireless terminal is passed; and the access to the network terminal is authorized after the CA authentication is passed. The embodiment of the invention also provides a device and a system for controlling the access to the network terminal. By using the embodiment of the invention, the security level for controlling the access to the network terminal can be improved, thereby ensuring that the access to the network terminal of a user is safer and more reliable.

Description

technical field [0001] The invention relates to the technical field of network information security, in particular to a method, device and system for controlling access to a network terminal. Background technique [0002] Computer security involves many fields, but one of the most basic security issues is the control method of access rights. In order to protect information security, user identity authentication is required to prevent illegal users from logging into the system. [0003] Identity authentication in the field of information technology is achieved by binding a proof to an entity identity. The evidence is validated through a mechanism to determine whether the user is who the evidence claims to be. According to the authentication form of identity authentication, there are currently: password authentication, USB Key authentication, biometric authentication, etc. [0004] Password authentication is the most common way, using account number and password as an ident...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W12/06H04L9/32H04W12/069
Inventor 张万春
Owner HUAWEI DEVICE CO LTD