A method for WFII/3G router access authentication by using fingerprint

A technology of access authentication and authentication method, which is applied in the field of WFII/3G router access authentication through fingerprints, to achieve the effect of flexible and convenient control and increased security

Inactive Publication Date: 2012-08-01
西安龙飞软件有限公司
3 Cites 31 Cited by

AI-Extracted Technical Summary

Problems solved by technology

[0002] With the continuous development of 3G technology, the 3G wireless access rate is getting higher and higher, and the application of 3G wireless routers in enterprises and families is becoming more and more extensive, making multiple wifi users share 3G network resour...
View more

Abstract

The invention discloses a method for WFII/3G router access authentication by using fingerprint. The method is a router product integrated technical proposal which integrates 3G technology, WIFI technology and fingerprint identification technology. An user authority of sharing LAN or WAN resources is set by the system according to a fingerprint database and an authority pre-established, and users only need to input fingerprint information rather than user names and ciphers. The method provided in the present invention changes an original access mode of a same cipher and a same usage grade of the 3G router. In the original access mode, once the cipher leaked, an unauthorized user will access the network resources without limitation, thus the security is not high. The fingerprint authentication mode can hierarchically control the authority of the users, which increase the security of a whole system.

Application Domain

Security arrangement

Technology Topic

System safetyFingerprint database +5

Image

  • A method for WFII/3G router access authentication by using fingerprint
  • A method for WFII/3G router access authentication by using fingerprint

Examples

  • Experimental program(1)

Example Embodiment

[0019] The present invention will be further described below in conjunction with specific embodiments and drawings:
[0020] As attached figure 1 , 2 As shown, the fingerprint sensor is located on a PC or notebook, and is used to enter user fingerprint information; the fingerprint database and fingerprint identification mechanism are located in the wireless router to identify the user's identity; the PC-side software and driver provide user authentication and enter and delete fingerprint information Way. In the whole solution, only the super user needs to use the user name and password to authenticate the identity to add, delete, modify the fingerprint library and set the user authority level. The set information is all retained in the 3G wireless router; the user uses the PC and turns on The PC side software of the wireless router. At this time, the PC software uses the universal user name and password to connect to the wireless router (this user name and password can be set in advance, and the user does not need to know). After the connection, the user is placed in the restricted list on the 3G wireless router , LAN and WAN access is not possible, only waiting for the follow-up fingerprint authentication work; the user uses the PC-side software to start the fingerprint entry process, the user enters the fingerprint information in the fingerprint sensor, and the data is transmitted to the 3G wireless router; the 3G wireless router is based on Compare the fingerprint records in the fingerprint database and query user information. If the user's fingerprint is not recognized, the user will continue to be in a restricted state. If the user is a legal user, the user will be given different usage rights according to the user's identity; the 3G router will clear it when the user logs out The user information so that the user can re-authenticate when logging in again.

PUM

no PUM

Description & Claims & Application Information

We can also present the details of the Description, Claims and Application information to help users get a comprehensive understanding of the technical details of the patent, such as background art, summary of invention, brief description of drawings, description of embodiments, and other original content. On the other hand, users can also determine the specific scope of protection of the technology through the list of claims; as well as understand the changes in the life cycle of the technology with the presentation of the patent timeline. Login to view more.

Similar technology patents

Offset support cantilever type piezoelectric inertia impact precision driver

InactiveCN101068100ASimplify drive signal generation systemeasy to control
Owner:JILIN UNIV

Blue-purple light or blue light excitation fluorophor, preparation method thereof, and packaged white light diode

InactiveCN101186818AProcess environmental protectioneasy to control
Owner:TIANJIN UNIVERSITY OF TECHNOLOGY

Classification and recommendation of technical efficacy words

  • easy to control
  • improve security

Pesticide micro-capsule granules and preparation method thereof

InactiveCN102100229Alow toxicityimprove security
Owner:联合国南通农药剂型开发中心 +1

Method for achieving user authentication by utilizing camera

InactiveCN103678984Aimprove securityGuaranteed picture quality
Owner:湖北微模式科技发展有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products