Secure access control method and device for wireless network

A wireless access and secure access technology, applied in security devices, wireless communications, electrical components, etc., can solve the problems of more than 200,000 RMB, difficult security and usability trade-offs, and high cost of wireless access control solutions

Active Publication Date: 2010-12-08
UCWEB
View PDF4 Cites 19 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

If the client software is installed on the access terminal, the cost of the whole set of products usually exceeds RMB 200,000
[0005] Secondly, the wireless access terminals used in the enterprise usually have multiple requirements and often change, and the existing wireless admission control solutions are

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Secure access control method and device for wireless network
  • Secure access control method and device for wireless network
  • Secure access control method and device for wireless network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Specific embodiments of the present invention will be described in detail below in conjunction with the accompanying drawings.

[0023] figure 1 A flow chart of the wireless network security access control method according to the present invention is shown.

[0024] Such as figure 1 As shown, when a wireless access terminal wishes to access a wireless network within an enterprise, first, in step S110, the type of the wireless access terminal is determined according to the MAC address of the wireless access terminal. For example, wireless access terminals can be classified as mobile terminals or notebook computers according to their MAC addresses. Of course, wireless access terminals can also be subdivided into many other types, such as mobile terminals into enterprise test mobile terminals, enterprise employee test mobile terminals, and notebook computers into enterprise notebook computers, enterprise employee notebook computers, or temporary Guest laptop. Then, the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a secure access control method for a wireless network, which comprises the following steps of: confirming the type of a wireless access terminal according to an MAC (Media Access Control) address of the wireless access terminal; confirming the access permission of the wireless access terminal by utilizing a preset firewall policy according to the type of the confirmed wireless access terminal; and allowing the wireless access terminal to access a network with access permission by utilizing the confirmed access permission. The secure access control method for a wireless network can ensure that the client ends carry out access by the wireless network are trusty and can be used for establishing more flexible access permission according to a role of the client end, thereby meeting the legal access requirements of various roles in different environments and filtering and blocking an illegal unauthorized access request.

Description

technical field [0001] The present invention relates to the field of wireless networks, and more specifically, to a wireless network security control method and device. Background technique [0002] With the progress of society and the development of technology, people increasingly use access terminals to access the Internet or an enterprise internal network in a wireless manner to obtain information. In this case, the confidential information on the internal network of the enterprise is likely to be illegally accessed by unauthorized users, causing the confidential information to spread out, thus causing great economic losses to the enterprise. Therefore, in the internal network of the enterprise, wireless access control needs to be adopted. By installing the wireless access client software on the wireless access terminal and using the wireless access account to centrally manage the wireless access terminal, thereby restricting unauthorized users Illegal access to the inte...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/08H04W12/088
Inventor 梁捷张翼
Owner UCWEB
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products