Authentication method, device and system based on two-dimensional code

A technology of two-dimensional code and two-dimensional code information, which is applied in the field of communication, and can solve the problems of cumbersome authentication process and low efficiency of authentication method of wireless network

Active Publication Date: 2014-01-22
上海锐山网络有限公司
View PDF5 Cites 30 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the prior art, the user's authority to use the wireless network is controlled through the account. However, for places with a large flow of people, visitors are temporary users, and the process of authenticating the authority to use the wireless network is cumbersome. Taking schools as an example, visitors need to carry valid The ID card goes to the network management center to register for network access. The network management center authenticates the visitor and associates the account with the visitor's identity before granting the visitor account. The account can be composed of a user name and password, for example, and the visitor is allowed to use the account Authenticate to use the school's wireless network, and the network management center needs to log out the visitor when the visitor leaves
Apparently, the efficiency of the authorization method for wireless network use in the prior art is not high

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method, device and system based on two-dimensional code
  • Authentication method, device and system based on two-dimensional code
  • Authentication method, device and system based on two-dimensional code

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0024] In order to improve the efficiency of the authentication of the use authority of the wireless network, the network management center grants legal users who can know the specific identity information to have a certain guarantee authority, and the user with a certain guarantee authority is called an authorized guarantee user. The authority of the legal identity of the number of visitors, that is, the visitor can obtain the authority to use the wireless network by using the identity of the authorized guarantee user guaranteed by the visitor. The present invention establishes a two-dimensional code and an account information table corresponding to the two-dimensional code according to the demand information of the authorized guarantee user. The two-dimensional code contains the identification of the authorized guarantee user and the two-dimensional code identification, and is scanned by the user equipment used by the visitor. The QR code obtains the identity information of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides an authentication method, a device and a system based on a two-dimensional code. The method comprises the steps that first two-dimensional code information sent by wireless access equipment is received by a Portal authentication server, wherein the first two-dimensional code information is information acquired by user equipment by scanning the two-dimensional code, and comprises a first authorization guarantee user marker and a first two-dimensional code marker; request information for acquiring an account number allowing the user equipment to perform network access authentication is sent to a two-dimensional code authorization component, wherein the request information comprises the first authorization guarantee user marker and the first two-dimensional code marker; the two-dimensional code authorization component obtains a relation between the user equipment and a first authorization guarantee user; response information is sent to the Portal authentication server according to the first authorization guarantee user marker and the first two-dimensional code marker; and the Portal authentication server performs network access authentication management on the user equipment according to the response information sent by the two-dimensional code authorization component. The method, the device and the system improve the efficiency of use authority authentication of a wireless network.

Description

technical field [0001] The present invention relates to communication technology, in particular to an authentication method, device and system based on a two-dimensional code. Background technique [0002] With the rapid development of wireless communication technology, the application of wireless networks is becoming more and more extensive. However, for places with a large flow of people and high security requirements, such as schools, airports, stations, etc. people's attention. [0003] In the prior art, the user's authority to use the wireless network is controlled through the account. However, for places with a large flow of people, visitors are temporary users, and the process of authenticating the authority to use the wireless network is cumbersome. Taking schools as an example, visitors need to carry valid The ID card goes to the network management center to register for network access. The network management center authenticates the visitor and associates the acco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06K7/10
Inventor 武卫
Owner 上海锐山网络有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products