Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Identity verification method, device and system

An identity verification method and technology for verifying results, applied in the field of devices and systems, and identity verification methods, can solve problems such as increasing illegal users' intrusion into wireless networks and occupation of wireless network resources, so as to improve operational efficiency and operating costs, and ensure legality , the effect of reducing the probability of intrusion

Active Publication Date: 2014-11-12
TENCENT TECH (SHENZHEN) CO LTD
View PDF4 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing technology, after the terminal establishes a primary connection with the access point according to the connection information of the access point, the user can perform operations such as webpage access and video viewing through the terminal, which undoubtedly increases the probability of illegal users invading the wireless network , causing a large amount of wireless network resources to be occupied by illegal users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Identity verification method, device and system
  • Identity verification method, device and system
  • Identity verification method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0031] In order to make the object, technical solution and advantages of the present invention clearer, the implementation manner of the present invention will be further described in detail below in conjunction with the accompanying drawings.

[0032] see figure 1 , the identity verification method provided by the embodiment of the present invention is applied to figure 1 in the wireless network system. The wireless network system includes a terminal (smart mobile terminal), a target access point, and a designated application server and an access point server located on the network side. Wherein, the terminal is used to scan the graphic identification (eg, two-dimensional code) of the target access point, and upload the user identification for logging in to the specified application and the access point information of the target access point. The target access point is used to send the user identification and access point information to the designated application server aft...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an identity verification method, device and system, and belongs to the technical field of wireless networks. The identity verification method comprises the steps that user identification for a terminal to log into a specific application and access point information of a target access point are acquired; a verification request is sent to an access point server so that the access point server can verify the verification request, wherein the verification request carries the user identification and the access point information; if the verification request passes the verification, a verification result fed back by the access point server is received and sent to the target access point, and the target access point establishes communication connection with the terminal after receiving the verification result. According to the identity verification method, device and system, the target access point sends the user identification and the access point information to a specific application server, the specific application server sends the verification request to the access point server, the user identification is verified, and therefore the legality of users can be guaranteed, the probability of intrusion of illegal users is lowered, the operation efficiency of the target access point is improved, and the operation cost of the target access point is lowered.

Description

technical field [0001] The invention relates to the technical field of wireless networks, in particular to an identity verification method, device and system. Background technique [0002] The rapid development of wireless network technology provides great convenience for people to surf the Internet anytime and anywhere. After the terminal establishes a communication connection with the access point, the user can conveniently perform operations such as webpage access and video viewing through the terminal. Further, in order to prevent illegal users from occupying wireless network resources, it is very necessary to verify user identity after the terminal establishes a primary connection with the access point according to the connection information of the access point. Only after the user has passed the identity verification, the user is allowed to initiate operations such as webpage access through the terminal, so as to regulate the users of the wireless network. In the exi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04W12/06
Inventor 陈健
Owner TENCENT TECH (SHENZHEN) CO LTD
Features
  • Generate Ideas
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More