Method and device for wireless network access and authentication

A wireless network and wireless network technology, applied in the field of communication, can solve the problems of damage to the interests of legitimate users and the inability to distinguish user identities, etc., and achieve the effect of unified management

Active Publication Date: 2012-02-08
RUIJIE NETWORKS CO LTD
View PDF5 Cites 43 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] WEP or WPA PSK is used for wireless network access. All users use the same password and enjoy the same access rights. It is impossible to distinguish the identity of each user, and once the password is leaked, it will also damage the interests of legitimate users.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for wireless network access and authentication
  • Method and device for wireless network access and authentication
  • Method and device for wireless network access and authentication

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0034] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0035] figure 1 A flowchart of a method for accessing a wireless network provided by an embodiment of the present invention, such as figure 1 As shown, the method includes:

[0036] Step 101, the wireless controller receives the access request sent by the user terminal, and the access request carries the user's wired network password and the use...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and a device for wireless network access and authentication. The method comprises the following steps: receiving an access request sent from a user terminal by a wireless controller, wherein the access request carries a wired network password of a user and an identification of a user terminal; sending an authentication request of the wireless network access to an authentication server, wherein the authentication request carries the wired network password of the user; receiving a network access permission information corresponding to the wired network password and obtained from a wired network account number bank by the authentication server according to the wired network password in the authentication request, and configuring a wireless network access permission of the user so that the user terminal corresponding to the user identification accesses the wireless network according to wireless access permission of the user. By utilizing the scheme provided by the invention, the access permission of the user can be discriminated when wireless network access is realized, and the unified management of the access permission and the password in the wired and wireless networks also can be realized.

Description

technical field [0001] The embodiment of the present invention relates to the field of communication technologies, and in particular to a method and device for accessing a wireless network and its authentication. Background technique [0002] At present, with the development of wireless technology, more and more wired network access users join the ranks of wireless network access users. Existing wired network access generally uses user name plus password for identity authentication before network access, while wireless network access generally uses Wired Equivalent Privacy (WEP for short) or wireless emulation protected access. (Wi-fi Protected Access, referred to as: WPA) pre-shared key (Pre-Shared Key, referred to as: PSK) way, all users use the same password. [0003] In the course of realizing the present invention, the inventor finds that there are at least the following problems in the prior art: [0004] WEP or WPA PSK is used for wireless network access. All users ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08
Inventor 林雁敏
Owner RUIJIE NETWORKS CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products