Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Network access method, system and authentication server

An authentication server, network access technology, applied in the fields of systems, authentication servers, and network access methods, can solve the problems of complex authentication process, high cost, and poor practicability, and achieve low access cost and access process. Simple, safety-enhancing effect

Active Publication Date: 2011-11-30
BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
View PDF6 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The certification process of these methods is more complicated, the cost is higher, and the implementability is not strong.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network access method, system and authentication server
  • Network access method, system and authentication server
  • Network access method, system and authentication server

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0022] First of all, it is explained here that in the following embodiments of the present invention, the type of network to be accessed by the access user is not limited, and the network to be accessed by the access user may be a wired network or a wireless network. The scenario of performing identity authentication on an access user and being ab...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a network access method, a network access system and an authentication server. The network access method comprises the following steps that: when an access user passes the identity authentication, the authentication server transmits a request short message for confirming whether an access channel is opened to a communication terminal of the access user through short-message conversion equipment; when a confirmation message returned by the communication terminal of the access user through the short-message conversion equipment is received, the indication information of opening the access channel is transmitted to the access equipment so that the access user accesses the network. By adoption of the technical scheme, the problem that the illegal user uses stolen user names and passwords for identity authentication can be solved, the probability of network attack by the illegal user is reduced and the safety of the network is improved; in addition, compared with the prior art, the technical scheme has the advantages of simplicity in access process and lower access cost.

Description

technical field [0001] The invention relates to wireless network technology, in particular to a network access method, system and authentication server. Background technique [0002] With the development of wireless network technology, wireless networks are becoming more and more popular, and more and more enterprises, units, and individuals begin to use wireless networks for network access. Wireless networks transmit information through wireless signals, and compared with wired networks, there are some natural security problems. For example: since wireless signals propagate in the air, any place that can be covered by wireless signals can be accessed, which means that user account numbers and passwords may be stolen. When the account number and password are maliciously stolen, the attacker can illegally attack the entire wireless network, and since it is impossible to track and locate which account the attacker has stolen, it is impossible to find that the wireless network...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W4/14H04W12/08H04W12/06H04W12/122H04W12/126
Inventor 臧志飞林雁敏
Owner BEIJING XINWANG RUIJIE NETWORK TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products