Hotel public network wired/wireless unified authentication roaming method
A public network and wireless technology, applied in wireless communications, transmission systems, electrical components, etc., can solve the problems of inconvenience, cumbersome use, and inability to achieve diversified network access control requirements, and achieve the effect of simplifying the authentication process
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0039] Example 1
[0040] As attached figure 2 This embodiment provides a VLAN Portal authentication method, which greatly simplifies the authentication process when a guest in a hotel accesses the wired network port of the guest room to surf the Internet.
[0041] In the second-layer networking, configure a unique 802.1Q VLAN number for the wired network port of each guest room, and configure other public wireless coverage areas such as meeting rooms, business centers, and other public wireless coverage areas, which are different from the wired network of the guest room. All VLANs end in Access port of HSIA.
[0042] For example, in Room 1001, when a guest computer or other terminal device is connected to the wired network port of the guest room, HSIA determines whether the computer or other terminal device has been authenticated and is within the set expiration date:
[0043] If it has passed the authentication and is within the set expiration date, then it is allowed to access the...
Example Embodiment
[0045] Example 2
[0046] As attached image 3 This embodiment provides a VLAN Portal authentication method for a wireless network.
[0047] In the second-layer networking, configure a unique 802.1Q VLAN number for the wired network port of each guest room, and configure other public wireless coverage areas such as meeting rooms, business centers, and other public wireless coverage areas, which are different from the wired network of the guest room. All VLANs end in Access port of HSIA.
[0048] When a guest’s computer or other terminal device accesses the wireless network port, HSIA determines whether the terminal device’s access has been authenticated and is within the set validity period:
[0049] If it has passed the authentication and is within the set expiration date, then it is allowed to access the network; otherwise, it is authenticated,
[0050] HSIA pushes the Portal authentication page to the guest’s computer or other terminal devices for password Portal authentication.
Example Embodiment
[0051] Example 3
[0052] As attached Figure 4 This embodiment provides a wired / wireless MAC authentication method for hotel guests.
[0053] In the second-layer networking, configure a unique 802.1Q VLAN number for the wired network port of each guest room, and configure other public wireless coverage areas such as meeting rooms, business centers, and other public wireless coverage areas, which are different from the wired network of the guest room. All VLANs end in Access port of HSIA.
[0054] On the basis of Embodiment 1 or 2, further, after the guest computer or other terminal device is connected to the wired / wireless network port authentication, HSIA can record the MAC address of the guest computer or other terminal device wired / wireless network card, and make Authentication records, push the Portal authentication success page, and the authentication system regularly updates and refreshes the MAC address within the validity period to the gateway. If the guest’s computer is wi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap