Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Access authentication method of terminals and access gateway

An access gateway and access authentication technology, applied in the field of communication, can solve the problems of high power consumption, complicated manual input, inoperability, etc., and achieve the effect of reducing power consumption, reducing complexity, and simple operation

Inactive Publication Date: 2014-08-13
CHINA UNITED NETWORK COMM GRP CO LTD
View PDF6 Cites 24 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Specifically, the current authentication of the WIFI module is usually through the user name and password, but for healthy terminals, manual input is too complicated, and it is not even operable for terminals that are not equipped with input peripherals. In addition, the gateway WIFI The module needs to be in working condition all the time, which consumes a lot of power

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Access authentication method of terminals and access gateway
  • Access authentication method of terminals and access gateway
  • Access authentication method of terminals and access gateway

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0038] like figure 2 As shown, this embodiment provides an access gateway, including:

[0039] A receiving module, configured to receive an access request from a terminal, where the access request carries a device identifier of the terminal;

[0040] Wherein, in this embodiment, when the terminal leaves the factory, the device identification, such as IMEI (International Mobile Equipment Identification Number, International Mobile Equipment Identification Number), generates a two-dimensional code or marks it on the device; the terminal's device identification is used as the authentication mark .

[0041] The authentication module is configured to authenticate the terminal requesting access according to the device identifier of the terminal, and if the authentication is passed, allow the terminal to access the gateway; otherwise, deny the terminal to access the gateway.

[0042] The access gateway also includes a storage module connected to the receiving module and the authen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an access authentication method of terminals and an access gateway. The method includes the steps that an access request of each terminal is received by the access gateway, and each access request carries equipment identification of the corresponding terminal; authentication is conducted on each terminal according to the equipment identification of the terminal requiring for access by the access gateway; if the authentication is successful, the corresponding terminal is permitted to have access to the gateway, and if the authentication is not successful, the corresponding terminal is not permitted to have access to the gateway; whether the terminals corresponding to all the stored equipment identification have access to the gateway or not is judged by the access gateway, and if yes, a WIFI module of the access gateway enters a power saving module. According to the access authentication method of terminals and the access gateway, equipment identities of terminals are used as authentication identities, the authentication problem of the terminals is solved through simple operation, power consumption of the gateway is reduced, the service life of a battery of the gateway is prolonged, and operation complexity is greatly reduced as for the terminals.

Description

technical field [0001] The invention relates to the communication field, in particular to a terminal access authentication method and an access gateway. Background technique [0002] With the rapid development of the information society, the human-to-human (Human to Human, H2H) communication connection has been far from meeting the development needs of society. The human-to-machine connection (Human to Machine, H2M) and the machine-to-machine connection ( Machine to Machine (M2M) has gradually become the main growth point of new connections and the main form of the Internet of Things. M2M services are widely used in smart meter reading, health care, Internet of Vehicles, smart agriculture and other services, playing an important role in promoting social progress. [0003] At present, the personal health and medical business mainly based on wearable health terminals is booming. A user has multiple health terminals at the same time, which are used for data collection of diff...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/08H04W88/16
CPCY02B60/50Y02D30/70
Inventor 解冰盛明哲毛峻岭
Owner CHINA UNITED NETWORK COMM GRP CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products