Unlock instant, AI-driven research and patent intelligence for your innovation.

Non-perceptual authentication method system, management method and system based on the method system

A technology without perception authentication and processing modules, which is applied in the field of wireless communication, and can solve problems such as frequent authentication interactions, small forwarding delay of authentication messages, and affecting user roaming physical examinations, etc.

Active Publication Date: 2020-01-07
浙江安吉椅业科技有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a non-perceptual authentication method system, a management method and a system based on the method system, which are used to solve the frequent problems between the AP and the cloud AC in the prior art. Authentication interaction, and because the forwarding delay of the authentication message is very small, when the AP and the cloud AC are transmitted across the public network, and the network status is poor, the delay of the authentication message will be doubled, resulting in data loss, and the user The switching speed is slow when roaming, and even the phenomenon of roaming failure seriously affects the user's roaming physical examination problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Non-perceptual authentication method system, management method and system based on the method system
  • Non-perceptual authentication method system, management method and system based on the method system
  • Non-perceptual authentication method system, management method and system based on the method system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0040] This embodiment provides a non-perceptual authentication method, which is applied to a wireless communication network composed of a terminal device, multiple wireless access points, and cloud ACs. The non-perceptual authentication method includes the following steps:

[0041] After the terminal device is associated with a wireless access point, release the Internet access permission so that the terminal device can directly access the Internet; at the same time, send an association message of the terminal device to the cloud AC;

[0042] According to different feedback messages sent by the cloud AC, an authentication operation matching the feedback messages is performed.

[0043]The non-perceptual authentication method described in this embodiment will be described in detail below with reference to figures. see figure 1 , which is a schematic flowchart of a non-perceptual authentication method in an embodiment. The non-perceptual authentication method is applied to a w...

Embodiment 2

[0050] This embodiment provides a non-aware authentication system, which is applied to a wireless communication network composed of terminal equipment, multiple wireless access points, and cloud ACs. The non-aware authentication system includes:

[0051] A processing module, configured to release the Internet access permission after the terminal device is associated with a wireless access point so that the terminal device can directly access the Internet;

[0052] A first communication module, connected to the processing module, configured to send an association message of the terminal device to the cloud AC after the terminal device is associated with a wireless access point;

[0053] An authentication operation module, connected to the processing module and the first communication module, configured to perform an authentication operation matching the feedback message according to different feedback messages sent by the cloud AC.

[0054] The sensorless authentication system ...

Embodiment 3

[0064] In this embodiment, a management method based on a non-perceptual authentication method is applied to a wireless communication network composed of terminal equipment, multiple wireless access points, and cloud ACs. The management method includes the following steps:

[0065] After establishing communication links with multiple wireless access points, receive the associated message of the terminal device sent by the wireless access point;

[0066] Find whether there is a disassociation message from the terminal device that is closest to the current wireless access point; if so, determine the wireless access point that sent the terminal device association message and the current closest wireless access point that is disassociated from the terminal device Whether they are the same, if they are the same, it is considered that the terminal device has roaming; if not, it is considered that the terminal device has no roaming; if not, it is considered that the terminal device ha...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides a non-perceptual authentication method, which is applied to a wireless communication network composed of a terminal device, a plurality of wireless access points, and a cloud AC. After the entry point is associated, the Internet access permission is released so that the terminal device can directly enter the Internet; at the same time, the association message of the terminal device is sent to the cloud AC; according to the different feedback messages sent by the cloud AC, the execution and feedback message The matching authentication action. The non-perceptual authentication method described in the present invention uses a pre-use strategy to meet the user's online requirements, that is, after the user associates with the wireless access point, he first accesses the network to surf the Internet (no authentication is required), and then the wireless access point and the terminal device automatically in the background Complete the certification. Since the authentication required for the user's Internet access and roaming is performed simultaneously, the user is completely unaware of the entire automatic authentication process, so that the user's imperceptible authentication of roaming can achieve a very good experience.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to an authentication method and system, a control method and a system, in particular to a non-perceptual authentication method system, a management method and a system based on the method system. Background technique [0002] The current wireless coverage is increasing, and more and more mobile terminal devices such as mobile phones are used. Internet access through WiFi has become the current mainstream method. The traditional wireless network management mode is that AC and AP are deployed locally and belong to the centralized network of the same LAN network. All AP data services are controlled and forwarded by the AC, so when terminals roam, all terminals are still authenticated by the Radius server in the same LAN network. When a terminal user roams and switches each time, a Portal authentication request is initiated, and the user enters a user name and password or S...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W8/08H04W12/08H04W12/06
CPCH04W8/08H04W12/08
Inventor 乐毅
Owner 浙江安吉椅业科技有限公司