Perception-free authentication method and system, control method and system based on same

A non-perceptual authentication and control method technology, applied in transmission systems, wireless communications, network data management, etc., can solve problems such as roaming failure, slow switching speed, and increased delay of authentication messages, so as to improve authentication efficiency and provide a better user experience , The effect of reducing the process of authentication requests

Active Publication Date: 2016-04-20
台州市吉吉知识产权运营有限公司
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] In view of the shortcomings of the prior art described above, the purpose of the present invention is to provide a non-perceptual authentication method system, a control method and a system based on the method system, which are used to solve the frequent problems between the AP and the cloud AC in the prior art. Authentication interaction, and because the forwarding delay of th

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Perception-free authentication method and system, control method and system based on same
  • Perception-free authentication method and system, control method and system based on same
  • Perception-free authentication method and system, control method and system based on same

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0048] This embodiment provides a non-perceptual authentication method, which is applied to a wireless communication network composed of a terminal device, multiple wireless access points, and a cloud AC. The group includes a group master wireless access point and a plurality of group member wireless access points, and the non-aware authentication method includes the following steps:

[0049] After the cloud AC establishes communication links with a plurality of wireless access points, the monitoring group member wireless access point forwards the authentication request originating from the terminal device;

[0050] Judging whether the authentication request can be authenticated, if so, feed back the first response message to the wireless access point of the group member forwarding the authentication request to allow the terminal device to directly access the Internet; if not, feed back the second response message to forward the authentication request The wireless access point...

Embodiment 2

[0062] This embodiment provides a non-perceptual authentication system, which is applied to a wireless communication network composed of terminal equipment, multiple wireless access points, and cloud ACs. A group, the communication group includes a group of master wireless access points and a plurality of group member wireless access points, and the non-aware authentication system includes:

[0063] The monitoring module is used to listen to the wireless access point of the group members to forward the authentication request originating from the terminal device after the cloud AC establishes communication links with multiple wireless access points;

[0064] The first judging module is connected with the monitoring module, and is used to judge whether the authentication request can be authenticated, and if so, calls the wireless access point for feeding back the first response message to the group member wireless access point forwarding the authentication request to allow the te...

Embodiment 3

[0074] This embodiment provides a wireless access point 2, please refer to image 3 , which is a schematic structural diagram of a wireless access point in an embodiment. Such as image 3 As mentioned above, the wireless access point 2 includes the sensorless authentication system described in the second embodiment. In this embodiment, the wireless access point 2 includes a processor and a memory, the processor is used to implement all functions of the non-aware authentication system except the function of storing authentication records, and the memory is used to implement the communication database Function to store authentication records.

[0075] The wireless access point described in this embodiment can prevent the terminal device from obtaining authentication information from the remote cloud AC when it is in the roaming state, reducing the process of cross-public network authentication requests and improving authentication efficiency, so that users roaming A very good...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a perception-free authentication method, comprising the following steps of after a cloud AC establishes communication links with a plurality of wireless access points, monitoring an authentication request forwarded by a member wireless access point from a terminal device; judging whether the authentication request is passed, if yes, feeding a first response message back to the member wireless access point forwarding the authentication request to allow the terminal device to directly access the Internet; if no, feeding a second response message back to the member wireless access point forwarding the authentication request, wherein the second response message indicates the member wireless access point to send the authentication request to the cloud AC, and an authentication record sending to a leader wireless access point is generated through the authentication of the cloud AC. According to the method, acquiring the authentication information from the remote cloud AC is avoided, the cross public network authentication request process is reduced, the authentication efficiency is improved, and thereby the perception-free authentication of user roaming can achieve good experience.

Description

technical field [0001] The invention belongs to the technical field of wireless communication, and relates to an authentication method and system, a control method and a system, in particular to a non-perceptual authentication method system, a control method and a system based on the method system. Background technique [0002] The current wireless coverage is increasing, and more and more mobile terminal devices such as mobile phones are used. Internet access through WiFi has become the current mainstream method. The traditional wireless network management mode is that AC and AP are deployed locally and belong to the centralized network of the same LAN network. All AP data services are controlled and forwarded by the AC, so when terminals roam, all terminals are still authenticated by the Radius server in the same LAN network. When a terminal user roams and switches each time, a Portal authentication request is initiated, and the user enters a user name and password or SMS ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04W8/08H04W12/08H04W12/06
CPCH04W8/08H04W12/08H04L63/0853H04L63/0876H04W84/20H04W12/06H04L61/5007H04L2101/622H04L63/08H04W88/02H04W88/08
Inventor 乐毅
Owner 台州市吉吉知识产权运营有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products