Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Boundary control method and system, and access controller

An access controller and border control technology, applied in the network field, can solve problems such as illegal access to the network

Active Publication Date: 2014-11-19
HUAWEI TECH CO LTD
View PDF4 Cites 16 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem of illegal access to the network after illegal users outside the predetermined range obtain the network password, the embodiment of the present invention provides a border control method, access controller and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Boundary control method and system, and access controller
  • Boundary control method and system, and access controller
  • Boundary control method and system, and access controller

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] Please refer to image 3 , which shows a method flowchart of the border control method provided in Embodiment 1 of the present invention. Embodiments of the present invention are described by taking the border control method applied to an access controller in a network system as an example. The border control methods include:

[0073] Step 101, acquiring the location information of the terminal;

[0074] The access controller acquires the location information of the terminal, and the location information is used to determine the location of the terminal.

[0075] Step 102, detecting whether the terminal is within a predetermined range according to the location information;

[0076] The access controller detects whether the terminal is within a predetermined range according to the location information, and the predetermined range is a range allowed to access the network.

[0077] Step 103, if the detection result is that the terminal is not within the predetermined r...

Embodiment 2

[0081] Please refer to Figure 4 , which shows the flow chart of the boundary control method provided by the second embodiment of the present invention, which is applied to the boundary control method in the embodiment of the present invention Figure 5 The application scenario shown is taken as an example for description. refer to Figure 5 It can be seen that, assuming that an enterprise uses AP1 to AP8 to cover the internal area of ​​the enterprise with wireless signals, the internal area of ​​the enterprise is the range shown in the box 501, and the external area of ​​the enterprise is the shaded part. For the convenience of description, it should be noted that Figure 5 The midline segment MC is perpendicular to the connection line between AP1 and AP2, the line segment ND is also perpendicular to the connection line between AP1 and AP2, and the line segment EF is the distance between the connection line between AP1 and AP2 and one side of the rectangle. The border cont...

Embodiment 3

[0108] Please refer to Figure 8 , which shows a structural block diagram of the access controller provided in Embodiment 3 of the present invention, the access controller belongs to a border control system, and the border control system also includes a wired network or a wireless network with the access controller At least two APs connected, the access controller includes:

[0109] An acquisition module 810 , a detection module 820 and a rejection module 830 .

[0110] The obtaining module 810 is configured to obtain location information of the terminal, and the location information is used to determine the location of the terminal;

[0111] The detecting module 820 is configured to detect whether the terminal is within a predetermined range according to the location information obtained by the obtaining module 810, and the predetermined range is a range allowed to access the network;

[0112] The rejecting module 830 is configured to reject the terminal from accessing the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a boundary control method and system, and an access controller, and belongs to the technical field of networks. The method comprises: obtaining position information of a terminal, the position information being used for determining the position of the terminal; according to the position information, detecting whether the terminal is within a preset scope, the preset scope being a scope in which the terminal is allowed to access to a network; and if it is detected that the terminal is not within the preset scope, rejecting the terminal' access to the network. According to the invention, through obtaining the position information of the terminal, whether the terminal is within the preset scope in which the terminal is allowed to access to the network is detected according to the position information of the terminal, and if it is detected that the terminal is not within the preset scope, the terminal' access to the network is rejected, such that the problem of illegal access to the network after an illegal user beyond the preset scope obtains a network password is solved, and the effect of protecting the network from being illegally accessed by the user beyond the preset scope.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a border control method, an access controller and a system. Background technique [0002] Wi-Fi (wireless fidelity, wireless fidelity) is a wireless broadband technology. Through Wi-Fi, the wireless interconnection of terminals such as personal computers and various handheld devices can be realized. [0003] Wi-Fi achieves wireless signal coverage through AP (access point, access point). AP has a certain coverage range, and terminals within this range can realize wireless interconnection. Considering security issues, existing technologies generally use encryption technologies such as WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access, Wi-Fi network security access) to encrypt the network to ensure network security. safety. [0004] In the process of realizing the present invention, the inventor found that the existing technology has at least the following disadvant...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04W48/04H04W48/08H04W48/16
Inventor 刘悦
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products