Method for mobile terminal to access to private network

A mobile terminal and network technology, applied in electrical components, transmission systems, etc., can solve problems such as prominent security problems, poor security, and easy cracking of user name and password information, so as to ensure simplicity, ensure storage security, and ensure safety effect

Inactive Publication Date: 2016-06-22
浙江公共安全技术研究院有限公司
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] (1) The access method mostly uses the username and password login method, the username and password information is easily cracked, and the security is poor;
[0004] (2) Access information is directly exposed to mobile terminal users. Once the mobile terminal is lost, access information is easily obtained by others, and security issues are prominent

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for mobile terminal to access to private network

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0019] Below in conjunction with embodiment the present invention is described in further detail:

[0020] This network access method is applied to the public security intranet login, and the specific steps are as follows:

[0021] 1) The mobile phone user submits a login application to the public security intranet, filling in information including user information, mobile terminal information, and SIM card information, and the public security intranet manually reviews the login application information;

[0022] 2) After the review is passed, the public security intranet encrypts the application information to generate a QR code;

[0023] 3) The mobile phone scans the QR code and parses it into plain text information and saves it in the sandbox;

[0024] 4) The mobile phone establishes the access point of the public security intranet according to the information saved in the sandbox, and the login is successful.

[0025] After logging in, the user deletes the login applicati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of software development and network access, and more particularly relates to a method for a mobile terminal to access to a private network. The method for the mobile terminal to access to the private network comprises the steps that: (1) a mobile terminal user makes a login application to the private network, and the private network checks the login application information manually; (2) the private network encrypts the application information to generate a two-dimensional code after the checking is passed; (3) the mobile terminal scans the two-dimensional code, analyzes the two-dimensional code into plaintext information and saves the information; (4) and the mobile terminal establishes a private network access point according to the saved information. The method establishes network access through combining the manual checking with the two-dimensional code interactively, has good security and is simple in operation.

Description

technical field [0001] The invention belongs to the technical fields of software development and network access, and in particular relates to a method for a mobile terminal to access a confidential network. Background technique [0002] Mobile terminals used in confidential networks such as public security intranets have high requirements for security, which is not only reflected in the hardware facilities of mobile terminals, but also puts forward high requirements for network access security of mobile terminals. Current technology has the following problems: [0003] (1) The access method mostly uses the username and password login method, the username and password information is easily cracked, and the security is poor; [0004] (2) The access information is directly exposed to the mobile terminal user. Once the mobile terminal is lost, the access information is easily obtained by others, and the security problem is prominent. Contents of the invention [0005] The pu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
CPCH04L63/0815H04L63/0853H04L67/568
Inventor 姚任农朱金成
Owner 浙江公共安全技术研究院有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products