Authentication method and apparatus and electronic device

An authentication method and equipment technology, applied in the field of authentication, can solve problems such as deceiving users to connect, and achieve the effect of improving security

Inactive Publication Date: 2016-06-01
YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
View PDF8 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] However, the inventor found in the process of implementing the present invention that the current authentication is only the authentication of the access point to the client, and there may be criminals in life who create some access points to trick users into connecting, and then implement illegal operations in the background to obtain User's private information

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Authentication method and apparatus and electronic device
  • Authentication method and apparatus and electronic device
  • Authentication method and apparatus and electronic device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The following will clearly and completely describe the technical solutions in the embodiments of the present invention with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some, not all, embodiments of the present invention. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0064] The wireless network access solution stipulated in the 802.11 protocol is divided into the following processes: scanning to select an access point, client authentication, and the client accessing the wireless network through the access point.

[0065] In the embodiment of the present invention, after the client scans and selects an access point, both the client and the access point are authenticated, and the client is associated with the access point onl...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses an authentication method and apparatus and an electronic device. After a client initiates an authentication request, the client is authenticated, an access point is also authenticated, namely bidirectional authentication is carried out, when both of the client and the access point pass the authentication, the client is associated with the access point, so as to effectively avoid the client accessing an illegal access point by mistake, and improving the security of the client.

Description

technical field [0001] The present invention relates to the technical field of authentication, and more specifically, to an authentication method, device and electronic equipment. Background technique [0002] If a wireless terminal wants to access the wireless network, it needs to scan to find the access point (commonly known as "hot spot"), and then enter the authentication stage. In the authentication stage, the access point authenticates the client. After the client passes the authentication, A client associates with an access point. [0003] However, the inventor found in the process of implementing the present invention that the current authentication is only the authentication of the access point to the client, and there may be criminals in life who create some access points to trick users into connecting, and then implement illegal operations in the background to obtain User's private information. [0004] Therefore, how to effectively prevent the client from mista...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04W12/06H04W12/04H04W12/12H04W12/033H04W12/122
CPCH04W12/04H04W12/06H04W12/12H04W48/16
Inventor 白小龙
Owner YULONG COMPUTER TELECOMM SCI (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products