Communication terminal and system and authority management method

A communication terminal and authority management technology, applied in wireless communication, transmission system, digital transmission system, etc., can solve the problem of difficulty in proper and effective management of WiFi mobile device access authority, achieve efficient authentication process, simple management, increase The effect of password authentication

Inactive Publication Date: 2014-05-21
ZTE CORP
View PDF5 Cites 29 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The main technical problem to be solved by the present invention is to provide a communication terminal, system and authority manag

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communication terminal and system and authority management method
  • Communication terminal and system and authority management method
  • Communication terminal and system and authority management method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0038]The overall idea of ​​the present invention is: by setting a permission list for managing user permissions in the communication terminal of the WiFi hotspot, storing the unique identification information of the identity of the user who is allowed to access in the list; The authentication request contains the unique identification information of the user. The communication terminal compares the identification information with the identification information in its authorization list. If the two match, it extracts the MAC address of the terminal to connect. If the terminal is the first time If the mobile terminal has logged in before, it will directly extract the MAC address in the authentication request to connect, and save the MAC address in the permission list. If the mobile terminal has logged in before, the MAC address of this access Compare the incoming MAC addresses, if the two are the same, connect directly according to the MAC address, but if the two are not the sam...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a communication terminal, a communication system and an authority management method. A connection is built by arranging an authority list, listing unique identification information of user identities of all mobile terminal devices being allowed to access a WiFi hotpot communication terminal, and authenticating the unique identification information in the authentication request of the mobile terminal through the communication terminal. Thereby, the communication terminal is convenient to manage the access authority effectively, and the management is simpler and more convenient, and is easy to operate. Meanwhile, the communication terminal authenticates the unique identification information of the user identities, so that the authentication process is more efficient, and the safety of the authentication process is also improved. At the same time, priority is set to the access authority of the users, so that the user with higher priority can access preferentially, and the management of the access authority is more humanized.

Description

technical field [0001] The present invention relates to the technical field of communication, and in particular relates to a communication terminal, a system and a rights management method. Background technique [0002] Mobile communication terminals, especially smart phones, have the function of self-built hotspots. When enabling the hotspot, you can choose multiple authentication methods, such as OPEN-NONE, WPAPSK, etc. If you choose the OPEN-NONE method, other users do not need to enter a password, which is convenient for access, but it cannot be managed, which may easily cause traffic theft; if you choose WPAPSK and other encrypted authentication methods, there is also the risk of password leakage, and the access process is very cumbersome. [0003] Existing WiFi (wireless fidelity, 802.11b protocol) chips generally have basic access management functions, such as access authority control and limitation on the total number of access clients. Take access control as an ex...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W12/06H04W12/08
CPCH04W84/12H04L63/083H04L63/101H04W12/06H04W12/08H04L63/0876H04L12/2814H04W24/08H04L63/10G06F21/305H04L63/08
Inventor 朱虹贾鑫
Owner ZTE CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products