Method, system and authentication server for being switched in and retreating from wireless local area network (WLAN)
A technology for authenticating servers and servers, which is applied in transmission systems, network topology, security devices, etc., can solve the problems of using WEB authentication links, poor security of MAC address authentication, and poor versatility of WLAN services, so as to reduce WEB authentication links and improve Effects of improving safety and versatility
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0041] Such as figure 1 As shown, it is a flowchart of the method for opening and changing WLAN services. The specific steps are as follows:
[0042] Step 101: The billing server (BOSS) receives a WLAN service activation request submitted by a terminal, where the WLAN service activation request includes a communication identifier and a terminal identifier.
[0043] When a terminal requests to enable WLAN services for itself or for other terminals, it needs to initiate registration with the BOSS. In the embodiment of the present invention, the communication identifier in the WLAN service activation request is the communication identifier of the terminal that initiated the request. If the terminal requests to activate the WLAN service for itself, the terminal identifier is the terminal of the terminal that initiated the WLAN service activation request. Identifier; if the terminal requests to open WLAN services for other terminals, the terminal identifier is the terminal identifier of...
Embodiment 2
[0066] After completing the opening and changing of the WLAN service, in the process of using the WLAN service, the second embodiment of the present invention provides a method for accessing the WLAN network to improve the security of the authentication process and prevent illegal users from using the WLAN service.
[0067] In this embodiment, it is assumed that after the WLAN service is activated and changed, the service status information corresponding to the activation of the WLAN service recorded in the authentication server is "offline".
[0068] Such as figure 2 As shown, it is a flowchart of a method for accessing a WLAN network provided by an embodiment of the present invention, and the specific steps are as follows:
[0069] Step 201: The first terminal sends an online service request to the authentication server.
[0070] When the second terminal needs to access the WLAN network, the first terminal bound to the second terminal during the service start-up process initiates an...
Embodiment 3
[0092] After using the method in the second embodiment of the present invention to access the WLAN network, the third embodiment of the present invention also provides a method for exiting the WLAN network, such as image 3 Shown is a flow chart of a method for exiting a WLAN network provided by Embodiment 3 of the present invention. In this embodiment, the authentication server and the service server may also be two independent devices, or may be integrated into one device. Similar to the second embodiment, if the authentication server and the service server are integrated into one server, the server can realize the functions of the authentication server and the service device in the following embodiment three, and the authentication server and service involved in the third embodiment The information exchange between servers will become the internal information transmission of the integrated server.
[0093] In the third embodiment of the present invention, the authentication ser...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 