Check patentability & draft patents in minutes with Patsnap Eureka AI!

Access authentication method and system

A technology for access authentication and access equipment, applied in the field of network communication, can solve the problems of reduced user experience, poor user perception, low efficiency, etc., and achieve the effect of improving access efficiency and user experience

Active Publication Date: 2014-04-23
MAIPU COMM TECH CO LTD
View PDF7 Cites 41 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, in the traditional implementation, for the access of the terminal equipment, the user needs to enter the account number and password every time he logs in. If the user logs out or disconnects, the login operation of repeatedly inputting the account number and password is required.
For mobile terminals that log out or disconnect more frequently, such repeated operations are more and more difficult, which not only reduces efficiency, but also reduces user experience
[0004] Therefore, in order to solve the above problems of low efficiency and poor user perception, there is an urgent need for a more convenient access authentication method for user terminals to access the network

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method and system
  • Access authentication method and system
  • Access authentication method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of the present invention.

[0023] An embodiment of the present invention provides an access authentication method, such as figure 1 As shown, the method may include:

[0024] 101. The terminal sends a webpage access request to the access device.

[0025] Wherein, the terminal and the access device may be wirelessly or wiredly connected, and multiple terminals may be connected to the access device, and this embodiment only uses one terminal as an example for illustration. A user opens a web...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access authentication method and system and relates to the technical field of communication. After a terminal is disconnected or quits the login, non-perception relogin can be realized so that the network can be more conveniently accessed by the terminal. The method mainly comprises the following steps: the terminal sends a webpage accessing request to access equipment; the access equipment carries an MAC (Multi-Access Computer) address of the terminal in a first access request and sends to a WEB server; the WEB server sends an access authentication request containing an MAC address of the terminal, an account and a password to an authentication server; the authentication server determines whether the terminal has an authentication record or not according to the MAC address, the account and the password; if the terminal has the authentication record before, the terminal is allowed to access the network. The access authentication method and system are mainly used for a process of the terminal accessing the network.

Description

technical field [0001] The invention relates to the field of network communication, in particular to an access authentication method and system. Background technique [0002] In a network system, in order to control user terminals to access or access network resources, operators or administrators usually assign specific user names and passwords to terminals for identity verification. When a user terminal needs to access network resources, it needs to upload the user name and password to the access device, and the authentication server in the network system will authenticate the user name and password, thereby realizing access control. [0003] However, in the traditional implementation, for the access of the terminal equipment, the user needs to input the account number and password every time he logs in. If the user logs out or disconnects, the login operation of inputting the account number and password needs to be repeated. For mobile terminals that log out or disconnect...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L29/08
Inventor 吴飞田华郑杨千
Owner MAIPU COMM TECH CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More