Border control method, access controller and system

An access controller and border control technology, applied in the network field, can solve problems such as illegal access to the network

Active Publication Date: 2018-07-31
HUAWEI TECH CO LTD
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the problem of illegal access to the network after illegal users outside the predetermined range obtain the network password, the embodiment of the present invention provides a border control method, access controller and system

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Border control method, access controller and system
  • Border control method, access controller and system
  • Border control method, access controller and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0072] Please refer to image 3 , which shows a method flowchart of the border control method provided in Embodiment 1 of the present invention. Embodiments of the present invention are described by taking the border control method applied to an access controller in a network system as an example. The border control methods include:

[0073] Step 101, acquiring the location information of the terminal;

[0074] The access controller acquires the location information of the terminal, and the location information is used to determine the location of the terminal.

[0075] Step 102, detecting whether the terminal is within a predetermined range according to the location information;

[0076] The access controller detects whether the terminal is within a predetermined range according to the location information, and the predetermined range is a range allowed to access the network.

[0077] Step 103, if the detection result is that the terminal is not within the predetermined r...

Embodiment 2

[0081] Please refer to Figure 4 , which shows the flow chart of the boundary control method provided by the second embodiment of the present invention, which is applied to the boundary control method in the embodiment of the present invention Figure 5 The application scenario shown is taken as an example for description. refer to Figure 5 It can be seen that, assuming that an enterprise uses AP1 to AP8 to cover the internal area of ​​the enterprise with wireless signals, the internal area of ​​the enterprise is the range shown in the box 501, and the external area of ​​the enterprise is the shaded part. For the convenience of description, it should be noted that Figure 5 The midline segment MC is perpendicular to the connection line between AP1 and AP2, the line segment ND is also perpendicular to the connection line between AP1 and AP2, and the line segment EF is the distance between the connection line between AP1 and AP2 and one side of the rectangle. The border cont...

Embodiment 3

[0108] Please refer to Figure 8 , which shows a structural block diagram of the access controller provided in Embodiment 3 of the present invention, the access controller belongs to a border control system, and the border control system also includes a wired network or a wireless network with the access controller At least two APs connected, the access controller includes:

[0109] An acquisition module 810 , a detection module 820 and a rejection module 830 .

[0110] The obtaining module 810 is configured to obtain location information of the terminal, and the location information is used to determine the location of the terminal;

[0111] The detecting module 820 is configured to detect whether the terminal is within a predetermined range according to the location information obtained by the obtaining module 810, and the predetermined range is a range allowed to access the network;

[0112] The rejecting module 830 is configured to reject the terminal from accessing the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a border control method, an access controller and a system, belonging to the field of network technology. The method includes: acquiring location information of the terminal, and the location information is used to determine the location of the terminal; detecting whether the terminal is within a predetermined range according to the location information, and the predetermined range is the range allowed to access the network; if the detection result is that the terminal is not within the predetermined range Within the range, the terminal is denied access to the network. The present invention acquires the location information of the terminal, and detects whether the terminal is within the predetermined range allowed to access the network according to the location information of the terminal, and if the detection result shows that the terminal is not within the predetermined range, then rejects the terminal to access the network; solves the problem of Illegal users who are outside the predetermined range access the network illegally after obtaining the network password; the effect of protecting the network from illegal access by users outside the predetermined range is achieved.

Description

technical field [0001] The invention relates to the field of network technology, in particular to a border control method, an access controller and a system. Background technique [0002] Wi-Fi (wireless fidelity, wireless fidelity) is a wireless broadband technology, through which the wireless interconnection of terminals such as personal computers and various handheld devices can be realized. [0003] Wi-Fi implements wireless signal coverage through an AP (access point, access point). The AP has a certain coverage range, and terminals within the range can realize wireless interconnection. Considering the issue of security, the existing technology generally adopts WEP (Wired Equivalent Privacy, wired equivalent privacy) and WPA (Wi-Fi Protected Access, Wi-Fi network security access) and other encryption technologies to encrypt the network to ensure the security of the network. safety. [0004] In the process of realizing the present invention, the inventor found that the...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04W48/04H04W48/08H04W48/16
Inventor 刘悦
Owner HUAWEI TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products